By type
2021-10-08 22:53:40,352 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-08 22:53:44,765 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-08 22:53:47.966 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-08 22:54:03.167 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-08 22:54:04.172 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-08 22:54:04.680 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-08 22:54:17.859 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 40.076 seconds (JVM running for 48.353) 2021-10-08 23:02:40.069 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 23:02:40.160 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 23:02:40.350 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-08 23:02:40.353 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 23:02:40.367 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-08 23:02:40.370 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 23:02:40.371 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 23:02:40.372 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 23:02:40.373 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 23:02:40.452 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 23:02:40.460 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 23:02:40.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 23:02:40.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 23:02:40.660 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 23:02:40.661 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 23:02:40.665 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 23:02:42.680 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 23:02:42.752 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 23:02:42.753 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 23:02:42.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 23:02:42.766 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 23:02:42.767 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 23:02:42.768 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 23:02:42.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 23:02:42.850 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 23:02:42.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 23:02:42.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 23:02:42.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 23:02:42.955 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 23:02:42.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 23:02:42.957 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 23:02:42.959 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 23:02:43.069 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:72:47:d8:33:11:10:3b:48:dc:e5:23:56:7b:ad:19:06:5b:9f:cb] modulus: b020bca3dd6d6dc44792b8d22c8c9e5ac0086482e37a38b59816f65f97eccb8aaf1add80b30244d4022b1318eaad2bb3b32582003b8bc5f127c8c32050c9da8ed07e1ecc0fc825877e59736d4fd16995a0ffba8fc3b90ea2c8b25b0219dfc8c5707690c6006f0739a8893639cdfc603b8b95cd593e0afd3c0411b42eaa29327916aa2d753c43e7d8437278b177e030d6541a245bf5438f54aa707fe410612b519b648d10649603a1088ca59a986e727ee1b314f78997d40f8b3e84647d52e1b0cedeb0729f68a541606228cabc2ede932cad5e5171732fedb8e9de0c75b4e28965df522bcb0e2984b5654b8ea054f1a394dde89c86d1b2a20dd747738df91551 public exponent: 10001 ] 2021-10-11 15:20:50.591 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:20:50.649 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:20:50.653 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-11 15:20:50.655 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:20:50.656 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-11 15:20:50.657 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:20:50.657 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:20:50.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:20:50.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:20:50.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:20:50.750 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:20:50.751 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:20:50.752 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:20:50.752 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:20:51.258 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:20:51.259 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:20:51.260 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:20:51.261 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:20:51.350 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:20:51.352 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:20:51.353 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:20:51.354 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:20:51.354 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:20:51.356 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:20:51.356 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:20:51.357 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:20:51.358 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:20:51.450 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:20:51.451 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:20:51.453 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:20:51.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:cf:1c:bf:87:64:0c:d0:0f:71:c6:90:ce:2b:9f:fa:81:48:ff:ff] modulus: b3f09cbc92d40aa7e61b1ab139b6b20ff2e24b76a173d7c2793374cec7e920416122239b918b8a2eeb2e17308d6923b053b5113133781e008f92f27be9a6dbd77026c228643fad0c91172fabb52d5c15d4b077f1d18ebc6b6c8437541c128e1a49d586b85d214dba929c6e3ff3c6ba4551b7d115dbbb8b3109ba417726bdc7bda3c1320ac6537cd72d4ed81c72364aa61cfa74bf950ead0e62a6f31461611ee40540d9b07cf8bda4aa36232dd2a2fb09633fa68162b75994bbef9088fd97640295e6422d9dc8abb9334c8274f5171b26db0c7a750b5783074ca02e3b2980d9c7a9f9ed83a7e4d191a4a82ce42ceb24cbc217f605b57711e2d4c288efd5272cd5 public exponent: 10001 ] 2021-10-11 15:23:35.089 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:23:35.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:23:35.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:23:35.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:23:35.094 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:23:35.149 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:23:35.150 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:23:35.151 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:23:35.152 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:23:35.154 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:23:35.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:23:35.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:23:35.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:23:35.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:23:35.287 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:23:35.288 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:23:35.288 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:23:35.289 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:23:35.293 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:23:35.349 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:23:35.350 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:23:35.351 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:23:35.351 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:23:35.352 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:23:35.353 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:23:35.353 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:23:35.355 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:23:35.355 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:23:35.356 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:23:35.358 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:23:35.363 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:ed:e8:0f:b8:7a:fa:16:55:dc:bc:9a:ce:b8:64:e0:d5:63:6c:4e] modulus: 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 public exponent: 10001 ] 2021-10-11 15:25:50.298 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:25:50.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:25:50.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:25:50.303 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:25:50.304 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:25:50.305 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:25:50.305 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:25:50.306 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:25:50.306 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:25:50.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:25:50.356 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:25:50.358 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:25:50.358 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:25:50.359 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:25:50.550 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:25:50.550 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:25:50.551 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:25:50.551 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:25:50.553 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:25:50.554 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:25:50.554 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:25:50.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:25:50.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:25:50.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:25:50.556 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:25:50.556 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:25:50.557 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:25:50.557 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:25:50.558 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:25:50.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:25:50.564 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:bc:29:aa:54:27:16:c6:5c:8c:95:50:c4:44:d4:68:26:17:09:e8] modulus: b4194d37b16c7dd90a91057c2b208d0fc44ffcbc7e58cc093eb71f80f46f1edb895da6f14b365af4b6dfa6d7a74e5272d293c47bd0719a43be153f682b082f01eb2635efcc8fc044b41a7587da06f0bdd657126991921c7809acfd0c0a7212af4207fb99d9fa709f76e78b255866d5f584ef5df9d086860a41713e7973752b14034418dfadb866dd40b87f2443972cfaab0cbf7e2045ea5182720c2a055d5d0679d751c8d54c7217513151c2ad1f34f3802b1cc81046f696524c8359f16fd4298e4982af7f218ddd46549253833e1bd14ed189e7da2b208e51e6db81b5d612d50b6d88988ffa34ee61cfb3e92d70b72a63c2b5ec8c7d23d64375b4d9eabba577 public exponent: 10001 ] 2021-10-11 15:25:54.730 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:25:54.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:25:54.733 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:25:54.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:25:54.734 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:25:54.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:25:54.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:25:54.735 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:25:54.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:25:54.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:25:54.753 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:25:54.754 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:25:54.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:25:54.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:25:54.830 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:25:54.830 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:25:54.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:25:54.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:25:54.852 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:25:54.853 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:25:54.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:25:54.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:25:54.855 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:25:54.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:25:54.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:25:54.857 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:25:54.858 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:25:54.858 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:25:54.858 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:25:54.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:25:54.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:78:79:bd:de:76:70:e8:07:e4:03:09:21:e2:47:ae:2b:1b:d6:8b] modulus: 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 public exponent: 10001 ] 2021-10-11 15:26:26.354 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:26:26.355 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:26:26.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-11 15:26:26.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:26:26.357 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-11 15:26:26.358 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:26:26.359 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:26:26.359 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:26:26.359 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:26:26.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:26:26.364 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:26:26.365 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:26:26.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:26:26.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:26:26.526 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:26:26.549 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:26:26.550 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:26:26.550 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:26:26.552 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:26:26.552 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:26:26.552 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:26:26.553 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:26:26.553 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:26:26.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:26:26.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:26:26.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:26:26.555 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:26:26.556 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:26:26.556 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:26:26.557 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:26:26.560 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:56:21:b8:39:ea:0d:b2:42:cb:e5:99:9f:fd:d3:37:42:d3:70:db] modulus: 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 public exponent: 10001 ] 2021-10-11 15:26:26.759 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:26:26.760 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:26:26.762 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-11 15:26:26.762 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:26:26.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-11 15:26:26.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:26:26.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:26:26.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:26:26.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:26:26.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:26:26.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:26:26.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:26:26.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:26:26.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:26:26.832 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:26:26.832 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:26:26.833 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:26:26.833 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:26:26.835 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:26:26.850 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:26:26.850 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:26:26.851 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:26:26.851 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:26:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:26:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:26:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:26:26.853 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:26:26.853 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:26:26.854 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:26:26.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:26:26.858 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:ce:c9:0a:1b:f6:51:0a:ed:d6:b1:60:ec:f9:71:4d:96:18:da:c7] modulus: d7e1f3eb494c0cce4286654560a58e2aabf816965f7ad2182028c5ad3b1a15f3f4bb0b58fcd28d748ecb8d8305ad013a15229def4af44a26ec022cfd9ba8fed9f638c53603e127e6cfb49e25af84207d545d0f212b4de5759d85e52ddad7ea5dba200cf1f5336f8d17158256380c24361aeb0454854b18544353407223d57caaf14008c136a4cd47fb902f2d13bd260165681576e78f7ca1248a2f5fd425cadf07b2b2a8bf72c67e6cf50b7682256f4f7164bd10d4e117302d8d7e6feecc0413b010e0f27b8c6d7c725c6ba6660feeb3fa48bd62022082111c259c1ed8344b2fa77ba825f1b3e8ee8a41b0de72da65f949e6d6a7acf6e57332e3416f1fac9c09 public exponent: 10001 ] 2021-10-11 15:27:00.908 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:27:00.909 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:27:00.911 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-11 15:27:00.911 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:27:00.912 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-11 15:27:00.912 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:27:00.912 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:27:00.913 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:27:00.913 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:27:00.913 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:27:00.918 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:27:00.918 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:27:00.918 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:27:00.919 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:27:01.049 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:27:01.050 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:27:01.050 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:27:01.051 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:27:01.052 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:27:01.053 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:27:01.053 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:27:01.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:27:01.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:27:01.055 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:27:01.055 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:27:01.055 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:27:01.056 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:27:01.056 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:27:01.056 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:27:01.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:27:01.060 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:5e:45:6b:41:52:9b:c7:b4:3e:d5:79:c7:27:c6:3c:85:c9:2b:17] modulus: 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 public exponent: 10001 ] 2021-10-11 15:27:38.042 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:27:38.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:27:38.043 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-11 15:27:38.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:27:38.044 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-11 15:27:38.044 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:27:38.044 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:27:38.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:27:38.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:27:38.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:27:38.049 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:27:38.050 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:27:38.050 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:27:38.050 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:27:38.183 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:27:38.184 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:27:38.184 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:27:38.184 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:27:38.186 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:27:38.186 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:27:38.187 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:27:38.187 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:27:38.187 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:27:38.188 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:27:38.188 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:27:38.188 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:27:38.189 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:27:38.189 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:27:38.190 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:27:38.190 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:27:38.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:5f:aa:c0:b7:89:e1:64:03:34:e9:00:c6:0b:89:bb:fa:5d:c4:52] modulus: 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 public exponent: 10001 ] 2021-10-11 15:28:47.101 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:28:47.102 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:28:47.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:28:47.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:28:47.108 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:28:47.109 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:28:47.109 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:28:47.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:28:47.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:28:47.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:28:47.116 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:28:47.117 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:28:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:28:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:28:47.248 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:28:47.249 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:28:47.249 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:28:47.250 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:28:47.251 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:28:47.252 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:28:47.252 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:28:47.253 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:28:47.253 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:28:47.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:28:47.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:28:47.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:28:47.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:28:47.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:28:47.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:28:47.256 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:28:47.259 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:b5:81:b8:a6:bb:3a:b8:ba:cf:db:e6:88:aa:32:dc:01:42:8a:aa] modulus: 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 public exponent: 10001 ] 2021-10-11 15:31:38.939 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:31:38.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:31:38.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:31:38.945 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:31:38.946 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:31:38.946 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:31:38.947 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:31:38.947 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:31:38.947 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:31:38.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:31:38.952 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:31:38.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:31:38.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:31:38.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:31:39.055 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:31:39.055 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:31:39.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:31:39.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:31:39.057 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:31:39.058 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:31:39.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:31:39.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:31:39.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:31:39.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:31:39.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:31:39.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:31:39.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:31:39.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:31:39.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:31:39.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:31:39.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:57:39:5a:56:aa:96:21:2c:68:63:f3:60:e6:3e:fd:fe:a5:d0:e4] modulus: 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 public exponent: 10001 ] 2021-10-11 15:33:11.561 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:33:11.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:33:11.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:33:11.564 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:33:11.564 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:33:11.565 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:33:11.566 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:33:11.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:33:11.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:33:11.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:33:11.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:33:11.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:33:11.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:33:11.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:33:11.678 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:33:11.678 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:33:11.679 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:33:11.679 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:33:11.681 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:33:11.681 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:33:11.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:33:11.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:33:11.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:33:11.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:33:11.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:33:11.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:33:11.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:33:11.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:33:11.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:33:11.686 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:33:11.751 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:79:f0:ea:77:7a:44:19:52:87:25:f7:1b:1f:6c:75:e5:f3:b5:a0] modulus: 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 public exponent: 10001 ] 2021-10-11 15:34:08.965 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:34:08.966 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:34:08.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:34:08.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:34:08.968 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:34:08.969 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:34:08.969 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:34:08.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:34:08.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:34:08.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:34:08.976 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:34:08.977 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:34:08.977 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:34:08.977 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:34:09.143 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:34:09.144 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:34:09.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:34:09.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:34:09.146 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:34:09.146 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:34:09.146 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:34:09.147 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:34:09.147 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:34:09.147 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:34:09.148 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:34:09.148 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:34:09.149 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:34:09.149 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:34:09.149 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:34:09.150 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:34:09.153 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0e:6e:12:fa:66:36:7a:5d:c0:9d:c0:68:a0:65:00:35:1d:9a:0d:26] modulus: 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 public exponent: 10001 ] 2021-10-11 15:34:48.651 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:34:48.652 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:34:48.653 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-11 15:34:48.654 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:34:48.654 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-11 15:34:48.655 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:34:48.655 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:34:48.655 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:34:48.655 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:34:48.656 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:34:48.659 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:34:48.660 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:34:48.660 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:34:48.660 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:34:48.758 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:34:48.759 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:34:48.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:34:48.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:34:48.760 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:34:48.761 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:34:48.761 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:34:48.761 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:34:48.761 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:34:48.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:34:48.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:34:48.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:34:48.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:34:48.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:34:48.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:34:48.764 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:34:48.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:f3:88:07:5b:72:3a:52:b5:37:68:68:12:bb:47:7c:09:b5:4c:1a] modulus: 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 public exponent: 10001 ] 2021-10-11 15:37:47.300 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:37:47.301 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:37:47.302 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:37:47.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:37:47.304 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-11 15:37:47.305 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:37:47.305 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:37:47.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:37:47.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:37:47.306 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:37:47.310 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:37:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:37:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:37:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:37:47.406 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:37:47.407 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:37:47.408 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:37:47.408 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:37:47.412 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:37:47.412 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:37:47.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:37:47.413 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:37:47.413 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:37:47.414 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:37:47.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:37:47.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:37:47.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:37:47.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:37:47.417 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:37:47.418 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:37:47.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:b4:d0:18:1c:83:7b:60:bc:b3:69:20:f4:cc:e7:26:82:71:56:a2] modulus: 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 public exponent: 10001 ] 2021-10-11 15:39:27.739 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:39:27.740 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:39:27.742 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:39:27.743 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:39:27.743 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-11 15:39:27.744 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:39:27.744 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:39:27.745 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:39:27.745 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:39:27.746 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:39:27.750 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:39:27.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:39:27.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:39:27.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:39:27.846 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:39:27.847 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:39:27.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:39:27.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:39:27.849 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:39:27.849 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:39:27.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:39:27.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:39:27.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:39:27.851 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:39:27.851 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:39:27.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:39:27.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:39:27.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:39:27.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:39:27.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:39:27.858 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:06:6d:c2:78:9a:3f:ae:26:bf:e5:5c:86:20:c3:49:65:05:c7:e9] modulus: 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 public exponent: 10001 ] 2021-10-11 15:41:15.738 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-11 15:41:15.739 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-11 15:41:15.740 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-11 15:41:15.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-11 15:41:15.741 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-11 15:41:15.742 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-11 15:41:15.742 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-11 15:41:15.742 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-11 15:41:15.742 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-11 15:41:15.743 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-11 15:41:15.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-11 15:41:15.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:41:15.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-11 15:41:15.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:41:15.842 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-11 15:41:15.842 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-11 15:41:15.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-11 15:41:15.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-11 15:41:15.845 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-11 15:41:15.845 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-11 15:41:15.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:41:15.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:41:15.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:41:15.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:41:15.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:41:15.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:41:15.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-11 15:41:15.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-11 15:41:15.849 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-11 15:41:15.850 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-11 15:41:15.853 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 405954925197206341718459166070646154421040016531 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 22:50:25 UTC 2021 Final Date: Wed Oct 08 22:50:24 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c] modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4 213170206559d9642e06fcb2d45938b3db983ed3 e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc 94180afdd082aede1aa4d71a539542a90fbef26e 0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4 d297a6b4e5afc80fe89bc149012820d3b63c2cf1 f379388d75a9f5438ac1723234895fc443e2808e 9f79b349bf0fb3d2211b217ae458de1751a1b8da 762df12b2d22e6ec1b900c8054818f103ee8d3cf de027983a119d1011ce097dec6ff7f75e3278c65 3dac379a98014b7f2c20f7323d84d84afe33a45b 92b50a6afe5d0d96cda83876595b9479e67d388c d8cc3af65b0798f011d32c7bbb96ede16a2a7401 32b5d57170186a350bcaf827bc7f3c82a6b66194 b9feb813bea198c29880306263b53178162a44a3 df097f831fc14106981023cd1d95a816eee93779 f1ac6bde0432d0fb70622c0c358453a6930f7bd8 4f9ce18868bd6103821ad64150e05d272d443123 d079c0a53dd95f5194bb68e455785b0adac041f5 794252db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:bc:f9:db:26:75:bd:34:1c:a8:68:3f:ff:dc:21:78:41:1c:c1:11] modulus: e36ead24ae477899706cdb0a46c0a6407d99e810a09ddc8d085076e604f37ca6d7ba579c29ebf9e2e1b6597cf378df5678aa4b215e79272b9a009a4e10c7137cd6b6abd0e070e03e7f03adb81d4dfab88827aa623d29885807ef184a1ec48c2481a204a98bd6a3080f74fe146b53a5c66d476a3c801aecade3a08752e0944c41f30865d793236f7c8674332d0e52424e6cb92fca4768ae37835def41959ddc0695cfd8b832fefc46738f4bda00d51b6309d778e145f986a55e803873cb6bc5b63bb55b4c4a7fc5789f3e8f6c1a7a780d15dd93522d7b3350a98024b26394364235cb5ae132062e4dda86e2896c831329e343911103718c668cef0516b49bac43 public exponent: 10001 ]