By type
2022-06-07 10:38:40,443 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-07 10:38:41,319 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-07 10:38:42.090 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 07, 2022 10:38:43 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 07, 2022 10:38:43 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 07, 2022 10:38:43 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 07, 2022 10:38:43 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-07 10:38:44.420 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-07 10:38:44.703 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-07 10:38:44.854 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-07 10:38:45.535 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-07 10:38:45.537 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-07 10:38:45.539 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-07 10:38:45.542 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-07 10:38:45.587 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-07 10:38:45.590 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-07 10:38:45.717 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-07 10:38:46.359 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 07, 2022 10:38:46 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-07 10:38:47.207 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.575 seconds (JVM running for 9.4) Jun 07, 2022 10:39:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-07 10:39:28.065 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 10:39:28.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 10:39:28.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 10:39:28.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 10:39:28.138 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 10:39:28.140 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 10:39:28.141 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 10:39:28.142 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 10:39:28.143 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 10:39:28.147 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 10:39:28.153 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 10:39:28.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 10:39:28.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 10:39:28.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 10:39:28.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 10:39:28.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 10:39:28.797 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 10:39:28.804 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 10:39:28.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 10:39:28.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 10:39:28.819 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 10:39:28.821 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 10:39:28.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 10:39:28.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 10:39:28.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 10:39:28.839 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 10:39:28.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 10:39:28.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 10:39:28.846 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 10:39:28.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 10:39:28.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 10:39:28.849 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 10:39:28.884 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:db:3c:59:14:6d:d5:08:d7:7e:a9:79:49:e8:de:a5:8c:ee:a0:8b] modulus: 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 public exponent: 10001 ] 2022-06-07 12:08:12.041 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:08:12.044 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:08:12.047 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:08:12.048 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:08:12.049 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:08:12.050 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:08:12.051 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:08:12.052 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:08:12.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:08:12.055 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:08:12.062 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:08:12.063 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:08:12.064 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:08:12.064 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:08:12.224 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:08:12.225 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:08:12.225 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:08:12.226 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:08:12.229 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:08:12.230 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:08:12.230 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:08:12.231 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:08:12.232 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:08:12.233 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:08:12.233 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:08:12.234 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:08:12.234 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:08:12.235 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:08:12.235 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:08:12.237 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:08:12.241 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:10:a0:a6:eb:be:f3:7d:31:e1:e9:19:af:84:a0:96:18:0e:5f:08] modulus: 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 public exponent: 10001 ] 2022-06-07 12:10:00.697 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:10:00.701 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:10:00.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 12:10:00.705 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:10:00.706 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 12:10:00.706 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:10:00.707 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:10:00.707 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:10:00.708 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:10:00.709 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:10:00.716 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:10:00.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:10:00.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:10:00.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:10:00.855 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:10:00.856 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:10:00.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:10:00.857 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:10:00.860 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:10:00.861 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:10:00.861 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:10:00.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:10:00.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:10:00.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:10:00.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:10:00.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:10:00.867 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:10:00.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:10:00.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:10:00.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:10:00.876 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:65:cf:c0:f6:32:01:d6:38:67:3a:37:44:1a:64:01:a2:64:b7:61] modulus: b4cc983b4298fed042a7ed664eddf5c8641b65fcb7e03c89fe5fd5d37ddafc59ee4fb6e5a6ba4ff66182938de19f4001ffa035295a3a1a5f7e0b72438e2f1bae45f3a8d10a66c6975bae668f7e7415d667cb7781bd0bd7505de25469302038d7518c10032da4e5e40442f9428713906f5035b3f9af06fce01bafe0fe2f886151e4cc622278c6dd941f8112ce6a442e2bcab81c63352da91010521c359210ea61017279542b35221d70c15a1913957a55d9ba151f6599481409b7bfb7f10cbd625f61a23e68663b2553fc68454098b39c30ebc6d225b5c1fc7dde42398f0f09120b1d1e0e709baaa0027e937ded1248e487b77a2df55a6f8b523958d9d7003d59 public exponent: 10001 ] 2022-06-07 12:11:30.326 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:11:30.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:11:30.328 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 12:11:30.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:11:30.329 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 12:11:30.330 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:11:30.330 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:11:30.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:11:30.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:11:30.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:11:30.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:11:30.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:11:30.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:11:30.337 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:11:30.501 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:11:30.502 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:11:30.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:11:30.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:11:30.505 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:11:30.505 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:11:30.506 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:11:30.506 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:11:30.506 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:11:30.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:11:30.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:11:30.508 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:11:30.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:11:30.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:11:30.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:11:30.510 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:11:30.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:a3:fd:09:bc:32:83:f8:a5:58:30:4e:74:15:eb:4d:ca:c0:db:23] modulus: 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 public exponent: 10001 ] 2022-06-07 12:13:17.205 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:13:17.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:13:17.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:13:17.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:13:17.209 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:13:17.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:13:17.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:13:17.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:13:17.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:13:17.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:13:17.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:13:17.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:13:17.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:13:17.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:13:17.354 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:13:17.355 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:13:17.355 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:13:17.356 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:13:17.357 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:13:17.358 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:13:17.358 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:13:17.359 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:13:17.359 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:13:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:13:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:13:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:13:17.361 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:13:17.361 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:13:17.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:13:17.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:13:17.367 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:e3:14:35:a2:7f:58:fb:05:e6:ee:23:f2:0a:19:bb:79:09:38:69] modulus: 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 public exponent: 10001 ] 2022-06-07 12:17:14.901 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:17:14.904 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:17:14.906 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:17:14.908 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:17:14.908 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:17:14.910 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:17:14.910 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:17:14.911 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:17:14.911 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:17:14.912 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:17:14.918 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:17:14.919 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:17:14.919 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:17:14.919 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:17:15.070 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:17:15.071 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:17:15.071 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:17:15.072 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:17:15.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:17:15.074 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:17:15.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:17:15.075 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:17:15.075 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:17:15.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:17:15.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:17:15.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:17:15.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:17:15.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:17:15.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:17:15.079 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:17:15.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:90:1d:7c:9f:19:94:92:6d:6f:92:ea:75:91:91:fc:84:f5:51:03] modulus: b7b6628ded91fa286178962b5072294ed22a617e873c8fcf4085035a98a0467b54b34ca58c6582daa5425497ab8f6e3f6b070849418e79fbaee63411a0b0e1e13fa175e8cd10c6c80affa48b65bba07949fe5190a50ee07923200247267af4fb076888d990e93f9f060cee39f42b3e39a04fde45ac7b3a61385b811302f93852381891f3ca9377096c81e9f4a3737c9abc8e765645dcb9bfbd02164d7f8b3c27963d789dcefe3843724a8fbe0c07f0e596b03db84bb248e4f85050e66702b06db70a3033fdd7f995cbac5e12c1f4970b92966ad7c0e3501e9372d5350f2cd4dc6e0b0d98a7cd98db4ec837e27c94ed23382820aa3f400b0ffe617000ae0f4605 public exponent: 10001 ] 2022-06-07 12:23:00.463 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:23:00.465 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:23:00.468 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:23:00.468 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:23:00.469 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:23:00.470 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:23:00.470 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:23:00.470 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:23:00.471 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:23:00.471 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:23:00.476 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:23:00.477 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:23:00.477 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:23:00.477 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:23:00.698 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:23:00.698 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:23:00.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:23:00.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:23:00.700 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:23:00.701 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:23:00.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:23:00.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:23:00.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:23:00.703 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:23:00.703 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:23:00.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:23:00.705 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:23:00.706 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:23:00.706 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:23:00.707 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:23:00.711 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:ed:4b:d1:26:d5:0c:be:ca:4c:6a:df:d8:fe:f2:d0:a5:26:8f:c5] modulus: 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 public exponent: 10001 ] 2022-06-07 12:26:58.126 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:26:58.131 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:26:58.135 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:26:58.136 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:26:58.137 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:26:58.138 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:26:58.139 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:26:58.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:26:58.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:26:58.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:26:58.148 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:26:58.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:26:58.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:26:58.150 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:26:58.341 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:26:58.342 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:26:58.342 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:26:58.342 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:26:58.344 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:26:58.344 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:26:58.345 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:26:58.345 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:26:58.345 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:26:58.347 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:26:58.347 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:26:58.347 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:26:58.348 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:26:58.349 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:26:58.349 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:26:58.350 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:26:58.355 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:51:ee:63:b9:4b:9e:16:c5:0e:2d:8e:6b:76:bf:d3:b9:a8:04:38] modulus: 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 public exponent: 10001 ] 2022-06-07 12:28:50.186 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:28:50.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:28:50.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 12:28:50.191 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:28:50.191 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 12:28:50.192 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:28:50.193 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:28:50.193 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:28:50.193 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:28:50.194 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:28:50.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:28:50.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:28:50.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:28:50.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:28:50.384 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:28:50.385 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:28:50.385 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:28:50.386 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:28:50.387 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:28:50.388 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:28:50.388 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:28:50.389 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:28:50.389 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:28:50.390 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:28:50.390 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:28:50.391 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:28:50.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:28:50.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:28:50.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:28:50.393 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:28:50.397 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:0a:eb:90:6a:93:4b:5f:9f:7c:07:d5:fa:d2:41:9d:36:f2:c7:39] modulus: b28891ba925305a5d8b67316c703404df2dae2aad792e20f6f441485aba0baf7fb6172a5c8fb32a2c2142ef5b9eed28c64092795b0df3e581bfefe041c58177abfdb7120c7b852d9bf43dbdfdba5382b07a4a3509586193582d8741ce8afd65df9aa353e2c85c0e7f65ae275ed06c1ee3353ba86230d487ddea57d94bfeedd80de47dfaab50f2c19b9c3a1a84d05a7882f13247ccd6c781be98bc1c3980bb5d12adcc740358f442b151a36e24d2939dcdee8d57fcb7e70e5b84a69fe5521103b7923f003d93ba489cabaffac4a5671f5b7191a99d0201aa96acd6776735d7fbe5ab47d24d207694a5eac6688bdcc049c339dbde459dd564ab50edf305bf07bcd public exponent: 10001 ] 2022-06-07 12:30:49.930 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:30:49.933 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:30:49.934 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:30:49.935 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:30:49.935 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:30:49.936 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:30:49.938 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:30:49.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:30:49.940 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:30:49.940 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:30:49.949 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:30:49.949 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:30:49.949 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:30:49.950 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:30:50.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:30:50.152 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:30:50.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:30:50.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:30:50.153 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:30:50.154 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:30:50.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:30:50.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:30:50.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:30:50.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:30:50.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:30:50.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:30:50.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:30:50.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:30:50.158 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:30:50.158 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:30:50.176 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:a3:f7:64:da:73:37:df:09:e5:11:e9:88:ad:04:a7:cf:45:9c:ad] modulus: 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 public exponent: 10001 ] 2022-06-07 12:34:51.465 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:34:51.468 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:34:51.470 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 12:34:51.471 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:34:51.471 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 12:34:51.472 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:34:51.473 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:34:51.482 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:34:51.482 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:34:51.483 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:34:51.495 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:34:51.496 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:34:51.496 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:34:51.497 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:34:51.669 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:34:51.669 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:34:51.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:34:51.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:34:51.671 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:34:51.671 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:34:51.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:34:51.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:34:51.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:34:51.675 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:34:51.675 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:34:51.676 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:34:51.676 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:34:51.676 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:34:51.677 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:34:51.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:34:51.684 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:9c:a8:3a:24:fe:43:1b:9e:d9:19:d3:f4:b2:08:37:e7:72:73:8e] modulus: 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 public exponent: 10001 ] 2022-06-07 12:35:09.088 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:35:09.089 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:35:09.091 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 12:35:09.091 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:35:09.093 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 12:35:09.094 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:35:09.094 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:35:09.094 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:35:09.095 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:35:09.095 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:35:09.100 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:35:09.100 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:35:09.100 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:35:09.100 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:35:09.227 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:35:09.228 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:35:09.229 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:35:09.229 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:35:09.231 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:35:09.231 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:35:09.231 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:35:09.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:35:09.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:35:09.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:35:09.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:35:09.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:35:09.234 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:35:09.234 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:35:09.234 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:35:09.235 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:35:09.238 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:8f:71:e3:3b:cd:c6:7b:a8:30:70:e5:fe:fa:fb:3d:91:cc:fd:73] modulus: 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 public exponent: 10001 ] 2022-06-07 12:35:20.772 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:35:20.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:35:20.774 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:35:20.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:35:20.775 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:35:20.776 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:35:20.776 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:35:20.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:35:20.777 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:35:20.777 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:35:20.781 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:35:20.782 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:35:20.782 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:35:20.782 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:35:20.900 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:35:20.901 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:35:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:35:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:35:20.903 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:35:20.903 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:35:20.903 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:35:20.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:35:20.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:35:20.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:35:20.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:35:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:35:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:35:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:35:20.906 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:35:20.906 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:35:20.909 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:26:26:ae:a2:14:3f:86:fb:21:ef:f4:ff:8c:3a:f0:20:20:bf:c4] modulus: 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 public exponent: 10001 ] 2022-06-07 12:40:13.999 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:40:14.001 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:40:14.003 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:40:14.005 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:40:14.005 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:40:14.006 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:40:14.006 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:40:14.007 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:40:14.007 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:40:14.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:40:14.013 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:40:14.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:40:14.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:40:14.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:40:14.180 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:40:14.181 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:40:14.182 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:40:14.182 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:40:14.183 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:40:14.184 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:40:14.184 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:40:14.184 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:40:14.185 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:40:14.185 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:40:14.186 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:40:14.186 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:40:14.187 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:40:14.187 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:40:14.187 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:40:14.188 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:40:14.192 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:45:9e:28:8e:b9:f7:2b:7a:2b:9c:31:94:a5:96:c3:6f:fc:a9:e6] modulus: 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 public exponent: 10001 ] 2022-06-07 12:44:15.453 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:44:15.454 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:44:15.456 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:44:15.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:44:15.458 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:44:15.459 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:44:15.459 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:44:15.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:44:15.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:44:15.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:44:15.465 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:44:15.465 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:44:15.465 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:44:15.466 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:44:15.624 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:44:15.625 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:44:15.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:44:15.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:44:15.626 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:44:15.626 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:44:15.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:44:15.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:44:15.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:44:15.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:44:15.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:44:15.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:44:15.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:44:15.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:44:15.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:44:15.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:44:15.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:88:f2:d4:d8:00:03:9f:02:8e:df:72:77:4c:63:c4:16:e0:cf:0b] modulus: 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 public exponent: 10001 ] 2022-06-07 12:50:27.480 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:50:27.483 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:50:27.485 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:50:27.486 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:50:27.487 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:50:27.487 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:50:27.488 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:50:27.489 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:50:27.489 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:50:27.489 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:50:27.495 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:50:27.496 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:50:27.496 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:50:27.496 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:50:27.774 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:50:27.775 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:50:27.775 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:50:27.776 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:50:27.777 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:50:27.777 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:50:27.777 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:50:27.777 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:50:27.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:50:27.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:50:27.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:50:27.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:50:27.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:50:27.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:50:27.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:50:27.780 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:50:27.784 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:0f:b3:f3:b9:ad:27:77:ac:c2:33:e4:fd:00:27:60:fc:d0:8e:84] modulus: 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 public exponent: 10001 ] 2022-06-07 12:54:31.373 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 12:54:31.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 12:54:31.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:54:31.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 12:54:31.380 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 12:54:31.381 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 12:54:31.381 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 12:54:31.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 12:54:31.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 12:54:31.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 12:54:31.388 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 12:54:31.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:54:31.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 12:54:31.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:54:31.533 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 12:54:31.533 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 12:54:31.534 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 12:54:31.534 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 12:54:31.535 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 12:54:31.536 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 12:54:31.536 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:54:31.536 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:54:31.536 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:54:31.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:54:31.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:54:31.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:54:31.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 12:54:31.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 12:54:31.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 12:54:31.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 12:54:31.542 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704065848739395500571375981761368886764035867037 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 10:36:34 UTC 2022 Final Date: Sun Jun 06 10:36:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df] modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb 55e339228232264f75b3af4d633a6db354898edc 7de79d308ea405723ffeecdd0ae06f45b4f262b2 554fedfb51f66a0eff53b1360fc03b31c131fb69 d65923c2d9ebce868d5423a1df60d1f8393da128 e9640e802cc54698e5a61277c520e8e4a731ec7d ffe8108464f0e305b229175bbd97d1227c222f5a 4548469241ee12a30c74f7de27696d65aa4e707e 83a5798e0c48f46392831774f599f5ce6605fe01 55d83d85b793868b5dbc49d917f9bc6edabe9050 4722caee18c458a97bf18a120c1c2a183b600e4f 9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4 b5b8bffba81176abc4b66e217817f725071873c1 90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5 4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6 1c3dc0abb19d46748e0d7294b6216d20d4eef689 75791de49afb56b2bcb14e49e629faa5d79850b7 d91059881e4d67f305ec9164b15176cea24d36f5 e732dd983541c06ab3e6b61fa415f922e3c482ca 765e78dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:33:47:23:b7:c8:a7:2f:34:78:d7:35:af:52:0d:f4:bd:36:f8:25] modulus: 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 public exponent: 10001 ]