By type
2021-05-31 17:44:22,130 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-31 17:44:27,333 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-31 17:44:30.831 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-31 17:44:43.942 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-31 17:44:45.144 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-31 17:44:45.945 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-31 17:45:00.955 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 41.796 seconds (JVM running for 49.876) 2021-05-31 18:03:47.441 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 18:03:47.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 18:03:47.629 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-31 18:03:47.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 18:03:47.735 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-31 18:03:47.738 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 18:03:47.743 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 18:03:47.743 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 18:03:47.744 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 18:03:47.829 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 18:03:47.835 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 18:03:47.945 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 18:03:47.951 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 18:03:47.951 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 18:03:48.043 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 18:03:49.643 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 18:03:49.646 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 18:03:49.646 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 18:03:49.651 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 18:03:49.653 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 18:03:49.653 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 18:03:49.738 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 18:03:49.740 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 18:03:49.832 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 18:03:49.833 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 18:03:49.835 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 18:03:49.836 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 18:03:49.836 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 18:03:49.930 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 18:03:49.931 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 18:03:49.932 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 18:03:49.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 18:03:50.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:c9:a2:86:d2:71:9c:52:65:f0:e7:60:98:10:5f:15:30:ba:a2:b1] modulus: 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 public exponent: 10001 ] 2021-05-31 19:08:32.872 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:08:32.875 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:08:32.878 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-31 19:08:32.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:08:32.882 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-31 19:08:32.883 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:08:32.884 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:08:32.884 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:08:32.885 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:08:32.941 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:08:32.943 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:08:32.943 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:08:32.945 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:08:33.132 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:08:33.138 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:08:33.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:08:33.145 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:08:33.147 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:08:33.148 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:08:33.150 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:08:33.151 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:08:33.229 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:08:33.230 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:08:33.231 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:08:33.231 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:08:33.232 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:08:33.234 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:08:33.234 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:08:33.235 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:08:33.238 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:08:33.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:c1:14:6d:e1:e6:a7:ef:13:80:d9:0c:30:a1:55:92:74:a9:4b:8e] modulus: 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 public exponent: 10001 ] 2021-05-31 19:09:41.874 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:09:41.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:09:41.876 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-31 19:09:41.877 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:09:41.877 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-31 19:09:41.878 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:09:41.878 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:09:41.879 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:09:41.879 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:09:41.884 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:09:41.885 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:09:41.885 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:09:41.888 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:09:42.030 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:09:42.031 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:09:42.031 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:09:42.034 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:09:42.035 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:09:42.035 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:09:42.038 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:09:42.038 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:09:42.039 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:09:42.039 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:09:42.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:09:42.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:09:42.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:09:42.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:09:42.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:09:42.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:09:42.043 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:09:42.046 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:af:6a:4b:c7:86:bf:42:6b:e2:a5:e8:62:31:e6:c3:3b:42:28:2c] modulus: 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 public exponent: 10001 ] 2021-05-31 19:15:16.072 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:15:16.074 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:15:16.077 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-31 19:15:16.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:15:16.079 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-31 19:15:16.080 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:15:16.080 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:15:16.081 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:15:16.082 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:15:16.087 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:15:16.088 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:15:16.088 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:15:16.090 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:15:16.234 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:15:16.235 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:15:16.235 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:15:16.237 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:15:16.237 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:15:16.238 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:15:16.239 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:15:16.240 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:15:16.240 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:15:16.240 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:15:16.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:15:16.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:15:16.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:15:16.242 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:15:16.243 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:15:16.243 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:15:16.244 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:15:16.250 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:c8:bf:67:9b:33:43:f8:10:a1:54:ba:71:90:2e:66:6b:e4:6d:a1] modulus: e0029e6cc29a63207d9eadb7e0d158ebb0a59497541f2a73d0a8622efccc383367d0ca08fc71c31d3781fd9bfa3a4e68bf3a1ae73c9d6ff1e2d89895a2702b3ee297e8915f6f9fc25fa58d7a9079a11586bf563b72c144adc18b40688a710656eb6184c50327b6777674fa7a41adab634d538403d21c26144fb3e6c5f2fd8b3d9e4f761048b37e94c61e546d59457e7646f616d95fe51179312cfe52d7a62ce04a4f2e1806eca141279bdff458bd8bc34b49fd52d2f5bae6cea62b2902503997cc30c2e63f6f9bd43a2980408bb8a54ed28fc5b8f5ec08b8f0d4a9714716536b0236ef096f80ca583417fdfd6997a4d94968734591cc95d829c02f0ddde261d7 public exponent: 10001 ] 2021-05-31 19:15:17.739 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:15:17.742 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:15:17.744 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-31 19:15:17.745 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:15:17.746 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-31 19:15:17.747 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:15:17.747 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:15:17.747 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:15:17.748 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:15:17.829 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:15:17.830 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:15:17.831 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:15:17.833 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:15:17.928 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:15:17.929 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:15:17.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:15:17.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:15:17.931 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:15:17.931 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:15:17.932 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:15:17.933 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:15:17.933 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:15:17.933 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:15:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:15:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:15:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:15:17.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:15:17.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:15:17.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:15:17.936 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:15:17.941 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:18:44:c3:cc:56:42:36:94:00:53:7b:01:e3:35:7d:e9:9b:94:22] modulus: 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 public exponent: 10001 ] 2021-05-31 19:16:46.453 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:16:46.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:16:46.459 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-31 19:16:46.462 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:16:46.463 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-31 19:16:46.464 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:16:46.465 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:16:46.465 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:16:46.466 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:16:46.477 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:16:46.528 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:16:46.529 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:16:46.532 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:16:46.635 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:16:46.636 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:16:46.636 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:16:46.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:16:46.639 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:16:46.639 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:16:46.641 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:16:46.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:16:46.645 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:16:46.645 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:16:46.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:16:46.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:16:46.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:16:46.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:16:46.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:16:46.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:16:46.655 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:16:46.735 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:a7:ee:63:95:71:9e:2a:79:76:11:95:4a:e6:0b:46:ff:9a:22:a7] modulus: 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 public exponent: 10001 ] 2021-05-31 19:18:03.276 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:18:03.278 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:18:03.280 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-31 19:18:03.280 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:18:03.281 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-31 19:18:03.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:18:03.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:18:03.283 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:18:03.283 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:18:03.289 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:18:03.290 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:18:03.290 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:18:03.292 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:18:03.429 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:18:03.429 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:18:03.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:18:03.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:18:03.431 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:18:03.431 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:18:03.433 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:18:03.433 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:18:03.433 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:18:03.433 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:18:03.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:18:03.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:18:03.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:18:03.435 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:18:03.435 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:18:03.435 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:18:03.436 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:18:03.439 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:3f:fc:5b:b1:68:a7:dd:e7:4f:8e:08:f1:6b:11:42:83:b7:56:fe] modulus: c047735be6773e463d786e726fa734904d192c4a91bbc8a90c030fe64a4299a3a168c65346740b55037d72ae2fe82ed220d4411f54086c8e3d380f82436923c1c07461721b798b2aaadefa30181a718f6310d1f74a73531a80a523cdda1512a10c7b1bad06003624efe87d28c25543375e229703356a4ce470c68e60195b82eaeca1cdc862b78cb2fbe3e5a8691385907484d88ee4ec026908144d6e8dde19e21226b942af07c2d44db667b07a556b8d80ff420854a6e536a2d4166bd727348d49cdf015b209a6f5384428013912a9bf26894d08d88096e43ff052501ded6cd21c38c5319fa30071939344cea20ae83b002d186593c152ceed4793cb87788161 public exponent: 10001 ] 2021-05-31 19:24:44.743 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:24:44.745 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:24:44.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-31 19:24:44.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:24:44.749 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-31 19:24:44.750 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:24:44.750 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:24:44.751 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:24:44.751 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:24:44.759 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:24:44.760 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:24:44.761 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:24:44.763 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:24:44.931 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:24:44.931 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:24:44.932 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:24:44.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:24:44.934 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:24:44.934 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:24:44.936 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:24:44.937 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:24:44.938 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:24:44.938 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:24:44.939 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:24:44.939 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:24:44.940 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:24:44.940 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:24:44.941 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:24:44.941 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:24:44.942 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:24:44.946 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:93:7d:cc:e8:2a:27:7a:e6:75:59:56:26:00:74:4e:f5:8b:6e:1c] modulus: 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 public exponent: 10001 ] 2021-05-31 19:25:28.265 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:25:28.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:25:28.270 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-31 19:25:28.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:25:28.271 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-31 19:25:28.272 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:25:28.273 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:25:28.273 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:25:28.274 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:25:28.281 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:25:28.282 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:25:28.282 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:25:28.284 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:25:28.411 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:25:28.411 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:25:28.412 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:25:28.413 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:25:28.413 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:25:28.414 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:25:28.415 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:25:28.415 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:25:28.415 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:25:28.416 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:25:28.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:25:28.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:25:28.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:25:28.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:25:28.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:25:28.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:25:28.428 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:25:28.432 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: d2d83fc257e112fe6f9ef708243ae83c701a4fb1c82bc956fa4dfcbe5f0f10910fd8a8fa4283731fba5a0a28d9fa5e2f59c4ce78904d912027ef648b53693e190fc51cd82546c9de2cefc3dd5e4389c16c14b92a84aa1a10ea7d402329ffb0f20e93c99424e1abacb7d9b1a9b7f899f14bdc4edef97192fa631aa384e0eb20e729460452467ac4fff71b8587b8e330ff18dd0782eebb0e62643863f29948dd4212f56d0026ff3199ba5e0359df3c386162efca4dd41219d3aa3ffb466ba8c2eed57dfc975e820ec22d7eb0388c6b832462a5dee7fab81e461b0ceb16723402f87a9d1478d63bb5696c7764f1aede78d83c3c51705ee4fbeea4a5b36552a23bc023a037714e67a8abc167c43e414052e2cf424a670b676a0e296f06f7e60cf730afc6f62cbe86761fd493a4ee98e4ba779a8d0e38e916ac687905960e8804688e4a2f8594882f8e0ddea5cb781937b72d163ee1a65c27bd77696e55520f7917356f08c98b3acafbad45ed82d97f93a7437ee30f05d5981dbef7ccb62565cdb4dd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:3f:73:ad:16:26:90:92:b7:32:06:3a:76:5e:75:06:d3:09:ca:20] modulus: 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 public exponent: 10001 ] 2021-05-31 19:27:00.040 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-31 19:27:00.044 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-31 19:27:00.046 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-31 19:27:00.047 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-31 19:27:00.047 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-31 19:27:00.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-31 19:27:00.049 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-31 19:27:00.049 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-31 19:27:00.049 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-31 19:27:00.136 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-31 19:27:00.137 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:27:00.138 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-31 19:27:00.140 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-31 19:27:00.229 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-31 19:27:00.230 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-31 19:27:00.230 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-31 19:27:00.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-31 19:27:00.234 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1924 2021-05-31 19:27:00.235 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-31 19:27:00.238 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-31 19:27:00.238 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-31 19:27:00.239 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-31 19:27:00.239 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-31 19:27:00.239 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:27:00.239 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:27:00.240 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:27:00.240 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-31 19:27:00.240 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-31 19:27:00.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-31 19:27:00.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-31 19:27:00.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 41464566516957036916953857025484523159459021871 IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 31 17:27:41 UTC 2021 Final Date: Sat May 31 17:27:40 UTC 2031 SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6918b35748421da66fe2359e56a547a6ac0be65e 5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2 0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8 34404bf572ca1d7f1075007e4dc6f57bac6464a6 3b0ba488daff53b898b430881c5ce415d9847e1a 4af5411e108b6f8f1340a64f757734ee2cc5350b 0bedef9c9983155aeab7e594a5547d1d6dd65f31 41c839822589d34c06db3db6eeab2cd42aac4594 3d1408f7218b4404559becda67e91603c4c55492 cce6ed8db99be96d6d85f02d27ac5c2f384722c0 df6f03846be43fb4c7b9492a002ae9a75c24cb3d 4fca9eaac526dc621616a8532c4a8f01a7f4fa9e 73144f7e087a650265a5feae3f4a6da5aab650d1 226e67752d86da74026d526afb08689e3c056b49 c149b5196465df3c65c5fe7c4d1300f498e2209a 2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a b6c2a99c495c613722681413fbbbd1989ba058f4 c43dba993f0a1273e0a591aaf7853f0883787782 4f54e2a64027e050da89e7551f0fcc2ea974802c d0081bd3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:49:00:fd:95:a4:16:31:3f:e9:72:10:33:b2:1c:f7:17:c6:37:15] modulus: 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 public exponent: 10001 ]