By type
2022-06-03 03:10:23,826 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-03 03:10:24,913 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-03 03:10:25.611 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 03, 2022 3:10:27 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 03, 2022 3:10:27 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 03, 2022 3:10:27 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 03, 2022 3:10:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-03 03:10:28.573 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-03 03:10:28.895 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-03 03:10:29.113 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-03 03:10:30.177 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-03 03:10:30.180 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-03 03:10:30.181 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-03 03:10:30.184 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-03 03:10:30.224 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-03 03:10:30.227 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-03 03:10:30.352 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-03 03:10:31.773 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 03, 2022 3:10:32 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-03 03:10:33.205 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.315 seconds (JVM running for 12.467) Jun 03, 2022 3:10:58 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-03 03:11:48.942 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 03:11:48.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 03:11:49.004 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 03:11:49.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 03:11:49.029 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 03:11:49.033 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 03:11:49.034 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 03:11:49.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 03:11:49.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 03:11:49.041 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 03:11:49.048 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 03:11:49.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 03:11:49.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 03:11:49.100 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 03:11:49.100 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 03:11:49.104 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 03:11:49.816 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 03:11:49.819 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 03:11:49.820 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 03:11:49.821 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 03:11:49.831 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 03:11:49.832 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 03:11:49.833 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 03:11:49.834 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 03:11:49.834 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 03:11:49.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 03:11:49.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 03:11:49.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 03:11:49.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 03:11:49.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 03:11:49.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 03:11:49.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 03:11:49.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: aec5f187e0f863a667b8e6e0bbade1762c40bb52aa395508951687a02b82320a651d4df855812445947af1283900e0bfaf516934694b9b14544a4dc29356c24e903bd3e6ce260f9f50173b024aa6d3e08582be167341a18aabb2b8d652c69a503842da63176dd1e84095b7fc245909559716af6b8f8ad086bbb1d93d76160d544befec38952183c95db468770d52c4b2c33c0afdf5bcdb38598d59bccfe5e5797c3289553c9311a1b10cf930c11996be77ef6376af95ab4e73315dc90c2964e0f8f1b2c3fc04f655026e9676b9b9f3d99223262b21eed6fe261dce6401d087bb2ef54f981aba3a11db4b115d3f1ddb5b98874a6acf8e43439258bb19ffb9410bad4a9bbeec0eeae81029b82943978c46a6889c2d71a0d1e0e10375b7b125e807219b389495dd01af596f8205bef6f97585e46b77dab748b3270ed2d58210223780ad51a477de5482cc29dfde9859a980b3b1d528819c6cb6cb91866671222303de38f2a8c7defe0e454c15084a7576a463bbba57988435dbfb1bb21daf97c74f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:28:9f:8d:b3:5f:45:18:78:a6:c5:60:7f:c0:aa:29:f5:62:f2:50] modulus: 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 public exponent: 10001 ] 2022-06-03 05:02:35.053 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:02:35.057 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:02:35.061 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:02:35.062 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:02:35.063 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:02:35.064 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:02:35.064 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:02:35.065 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:02:35.065 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:02:35.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:02:35.073 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:02:35.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:02:35.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:02:35.075 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:02:35.274 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:02:35.275 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:02:35.276 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:02:35.276 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:02:35.280 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:02:35.280 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:02:35.281 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:02:35.282 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:02:35.282 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:02:35.283 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:02:35.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:02:35.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:02:35.285 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:02:35.285 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:02:35.286 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:02:35.287 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:02:35.293 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:fc:8f:44:cf:fe:e0:dd:1a:d6:33:57:51:b5:84:ee:ba:b7:b3:d9] modulus: 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 public exponent: 10001 ] 2022-06-03 05:04:37.154 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:04:37.156 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:04:37.158 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 05:04:37.159 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:04:37.160 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 05:04:37.161 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:04:37.163 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:04:37.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:04:37.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:04:37.166 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:04:37.177 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:04:37.178 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:04:37.179 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:04:37.179 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:04:37.330 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:04:37.332 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:04:37.333 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:04:37.334 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:04:37.346 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:04:37.346 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:04:37.347 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:04:37.348 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:04:37.348 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:04:37.351 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:04:37.351 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:04:37.352 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:04:37.353 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:04:37.353 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:04:37.354 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:04:37.355 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:04:37.359 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:26:a6:90:f0:93:f7:1a:14:e9:15:9a:ee:07:f9:1c:d8:7c:2d:e7] modulus: b73b66fc8588ecb7672e9cc66562532383e72a2e215826cdbeb5dcf99f3e2be52cb6050bdb7b4a727e84a794209c0f0e9b52b78d46f761cf2092599d81cb0797d27f795b43c2121c9cb8f86d1c7f547a62e4a705774e691796e45a39a488a1a2bc1a79091b6f51a2fb31b2212b1aad46be1f9a674975b46d914833c07e0f101727003090a8a5b3d5244568cc9eb9503d730e9f7b8e946e401f98d47ac24eedbd12cbce623817c1fb35689907b85016c5bb24431a919be8ac93fb830cc8889a6273e7890fe5d76e056a6d1c20ead649a7d5de93bb5aa3ddb0c7064ae08b79c98a08d902150d2320c36d082e8d5a28f8101e73b19f3e3a28d7d32499ec89c901bd public exponent: 10001 ] 2022-06-03 05:06:02.863 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:06:02.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:06:02.867 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 05:06:02.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:06:02.875 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 05:06:02.887 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:06:02.889 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:06:02.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:06:02.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:06:02.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:06:02.906 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:06:02.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:06:02.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:06:02.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:06:03.033 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:06:03.034 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:06:03.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:06:03.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:06:03.040 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:06:03.040 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:06:03.041 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:06:03.041 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:06:03.042 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:06:03.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:06:03.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:06:03.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:06:03.044 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:06:03.045 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:06:03.045 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:06:03.046 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:06:03.050 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:e1:5c:4c:69:e7:c4:59:83:58:e8:c7:7a:d2:cb:e2:7d:d0:d9:a0] modulus: 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 public exponent: 10001 ] 2022-06-03 05:08:46.732 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:08:46.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:08:46.740 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:08:46.741 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:08:46.742 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:08:46.743 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:08:46.743 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:08:46.744 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:08:46.745 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:08:46.745 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:08:46.751 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:08:46.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:08:46.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:08:46.753 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:08:46.990 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:08:46.991 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:08:46.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:08:46.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:08:46.994 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:08:46.995 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:08:46.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:08:46.996 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:08:46.996 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:08:46.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:08:46.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:08:46.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:08:46.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:08:46.999 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:08:46.999 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:08:47.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:08:47.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:a6:ca:66:16:0c:5d:ac:bf:91:18:29:9b:ff:e7:a3:57:b5:a3:73] modulus: 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 public exponent: 10001 ] 2022-06-03 05:12:18.732 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:12:18.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:12:18.736 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:12:18.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:12:18.737 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:12:18.738 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:12:18.738 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:12:18.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:12:18.739 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:12:18.739 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:12:18.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:12:18.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:12:18.747 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:12:18.747 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:12:19.008 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:12:19.009 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:12:19.009 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:12:19.009 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:12:19.011 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:12:19.011 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:12:19.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:12:19.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:12:19.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:12:19.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:12:19.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:12:19.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:12:19.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:12:19.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:12:19.015 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:12:19.016 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:12:19.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:c7:98:49:4a:74:b7:7c:3b:f6:8c:c9:27:22:69:58:f9:60:b4:77] modulus: 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 public exponent: 10001 ] 2022-06-03 05:17:30.282 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:17:30.285 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:17:30.289 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:17:30.289 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:17:30.290 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:17:30.291 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:17:30.291 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:17:30.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:17:30.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:17:30.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:17:30.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:17:30.300 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:17:30.300 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:17:30.300 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:17:30.488 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:17:30.489 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:17:30.489 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:17:30.490 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:17:30.491 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:17:30.492 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:17:30.492 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:17:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:17:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:17:30.494 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:17:30.494 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:17:30.495 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:17:30.503 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:17:30.503 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:17:30.504 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:17:30.505 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:17:30.509 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: aec5f187e0f863a667b8e6e0bbade1762c40bb52aa395508951687a02b82320a651d4df855812445947af1283900e0bfaf516934694b9b14544a4dc29356c24e903bd3e6ce260f9f50173b024aa6d3e08582be167341a18aabb2b8d652c69a503842da63176dd1e84095b7fc245909559716af6b8f8ad086bbb1d93d76160d544befec38952183c95db468770d52c4b2c33c0afdf5bcdb38598d59bccfe5e5797c3289553c9311a1b10cf930c11996be77ef6376af95ab4e73315dc90c2964e0f8f1b2c3fc04f655026e9676b9b9f3d99223262b21eed6fe261dce6401d087bb2ef54f981aba3a11db4b115d3f1ddb5b98874a6acf8e43439258bb19ffb9410bad4a9bbeec0eeae81029b82943978c46a6889c2d71a0d1e0e10375b7b125e807219b389495dd01af596f8205bef6f97585e46b77dab748b3270ed2d58210223780ad51a477de5482cc29dfde9859a980b3b1d528819c6cb6cb91866671222303de38f2a8c7defe0e454c15084a7576a463bbba57988435dbfb1bb21daf97c74f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:3c:11:6a:74:dc:eb:4e:2c:90:6a:20:e1:74:ed:5d:42:7d:53:a6] modulus: c6afbdaf21b23560fcc627225cf3698bd00eb0c0bd5a3b3015e8398ca4bb8e5cced62814537259debcb48fb865e78ddaeabca6d11e66a85ac85e91db3dc6d054ea6bdf5750dff3425c7780ba349417148187e3bef060fce8de3f5c8631da942c40ccd4d5c394d5bad30eca0833536f8e9478551aa7addf2a62322458780a5e51abd8cded094aa2c38be80786d30ac9e07fd39933624486bedbf4ba3cc0b37bffee0f9c9967916241906533bc374b93ea3308f5e1770800965979c669a72ce6f6a219c398ce5f1f2fbdc15566f2af843ebf339b930cad164bf59bf892aff3942f6cbaa766a3dd1938b5d6bc065968ce96de1838f3bcdf3f4dbac6023929ace09b public exponent: 10001 ] 2022-06-03 05:20:29.598 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:20:29.602 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:20:29.609 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 05:20:29.614 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:20:29.615 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 05:20:29.616 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:20:29.620 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:20:29.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:20:29.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:20:29.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:20:29.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:20:29.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:20:29.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:20:29.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:20:29.844 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:20:29.845 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:20:29.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:20:29.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:20:29.847 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:20:29.848 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:20:29.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:20:29.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:20:29.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:20:29.856 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:20:29.860 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:20:29.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:20:29.868 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:20:29.870 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:20:29.871 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:20:29.874 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:20:29.887 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:40:61:15:04:16:2b:8f:b2:e2:04:b5:0e:3e:b4:32:27:64:d3:10] modulus: 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 public exponent: 10001 ] 2022-06-03 05:21:59.585 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:21:59.586 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:21:59.592 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:21:59.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:21:59.594 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:21:59.595 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:21:59.595 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:21:59.596 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:21:59.596 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:21:59.596 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:21:59.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:21:59.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:21:59.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:21:59.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:21:59.802 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:21:59.802 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:21:59.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:21:59.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:21:59.804 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:21:59.804 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:21:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:21:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:21:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:21:59.809 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:21:59.809 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:21:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:21:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:21:59.813 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:7a:c2:70:0f:3c:25:ef:82:ce:58:e6:60:82:49:df:79:06:de:dc] modulus: c33e81cbdec2e86ce789a0c7a409d0f42cf1a0c41c6f3947adf34df71b40bfa1b79436c2e077ecf37abd6d1cc0971fc3c8329b666df08645f235ea5bbc9ef2a9ca642acb9690e98596f808ebe70ccbe0213e9115f65fe49661f9795a6c42da6bfa3230a2663aa475ad6dd02b4d332fc42893eb4ebccfcbd7b777d2ddbc2a2624648c60204dd561725bda49c837db6891b7edb9a16c01bd2c2fde9369a819fecd2986a6691bf708daaed57e8790edd09b2a66ad4f1f456724ade83ef03ef546f6573419341f57bcfca09cc6e5c3a16b37b40d30e876c27cd4d104eebfa2a6076fb6af7c89b63af265207659bc578f403ec142aedcdfaa1a78e54eb0072297f1e9 public exponent: 10001 ] 2022-06-03 05:25:14.489 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:25:14.492 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:25:14.495 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 05:25:14.496 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:25:14.496 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 05:25:14.497 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:25:14.497 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:25:14.497 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:25:14.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:25:14.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:25:14.503 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:25:14.504 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:25:14.505 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:25:14.505 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:14.689 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:25:14.690 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:25:14.690 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:25:14.691 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:14.692 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:25:14.693 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:25:14.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:14.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:14.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:14.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:14.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:14.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:14.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:14.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:14.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:14.698 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:25:14.703 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:59:1e:00:ad:3f:50:f5:30:c4:39:99:bc:53:b5:62:81:28:8d:ea] modulus: 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 public exponent: 10001 ] 2022-06-03 05:25:29.539 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:25:29.542 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:25:29.545 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 05:25:29.546 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:25:29.546 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 05:25:29.547 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:25:29.548 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:25:29.548 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:25:29.548 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:25:29.549 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:25:29.553 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:25:29.554 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:25:29.554 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:25:29.554 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:29.682 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:25:29.684 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:25:29.685 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:25:29.685 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:29.686 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:25:29.687 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:25:29.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:29.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:29.689 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:29.690 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:29.691 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:29.692 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:29.693 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:29.694 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:29.694 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:29.695 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:25:29.698 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:93:f1:70:02:0b:11:94:bd:21:3b:8f:ba:85:03:0b:9d:8c:f6:31] modulus: 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 public exponent: 10001 ] 2022-06-03 05:26:10.715 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:26:10.717 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:26:10.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:26:10.719 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:26:10.719 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:26:10.720 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:26:10.720 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:26:10.721 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:26:10.721 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:26:10.722 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:26:10.726 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:26:10.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:26:10.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:26:10.728 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:26:10.963 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:26:10.964 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:26:10.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:26:10.965 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:26:10.967 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:26:10.967 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:26:10.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:26:10.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:26:10.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:26:10.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:26:10.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:26:10.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:26:10.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:26:10.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:26:10.972 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:26:10.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:26:10.978 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:d0:f0:67:ab:08:d3:b7:ba:86:5b:89:9a:4d:fb:ac:43:e6:26:44] modulus: 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 public exponent: 10001 ] 2022-06-03 05:30:26.602 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:30:26.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:30:26.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:30:26.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:30:26.608 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:30:26.608 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:30:26.609 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:30:26.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:30:26.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:30:26.610 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:30:26.615 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:30:26.615 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:30:26.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:30:26.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:30:26.792 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:30:26.792 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:30:26.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:30:26.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:30:26.794 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:30:26.795 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:30:26.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:30:26.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:30:26.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:30:26.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:30:26.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:30:26.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:30:26.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:30:26.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:30:26.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:30:26.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:30:26.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:31:4a:34:65:c7:09:2d:68:27:42:fb:a5:e2:b1:f6:5e:3c:36:19] modulus: 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 public exponent: 10001 ] 2022-06-03 05:34:43.490 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:34:43.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:34:43.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:34:43.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:34:43.502 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:34:43.505 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:34:43.505 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:34:43.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:34:43.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:34:43.507 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:34:43.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:34:43.523 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:34:43.523 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:34:43.524 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:34:43.764 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:34:43.765 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:34:43.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:34:43.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:34:43.768 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:34:43.768 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:34:43.769 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:34:43.769 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:34:43.769 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:34:43.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:34:43.771 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:34:43.771 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:34:43.772 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:34:43.772 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:34:43.772 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:34:43.773 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:34:43.778 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:b6:36:e5:f0:0f:82:0c:7a:26:f2:72:19:b4:2d:37:b8:f3:3a:1f] modulus: 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 public exponent: 10001 ] 2022-06-03 05:39:12.971 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:39:12.973 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:39:12.975 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:39:12.976 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:39:12.976 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:39:12.977 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:39:12.977 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:39:12.978 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:39:12.978 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:39:12.978 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:39:12.983 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:39:12.984 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:39:12.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:39:12.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:39:13.254 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:39:13.254 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:39:13.255 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:39:13.255 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:39:13.256 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:39:13.257 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:39:13.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:39:13.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:39:13.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:39:13.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:39:13.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:39:13.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:39:13.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:39:13.260 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:39:13.260 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:39:13.261 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:39:13.266 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:41:c0:76:2f:77:9e:79:76:8a:7e:ce:45:29:3d:69:a7:ea:da:12] modulus: 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 public exponent: 10001 ] 2022-06-03 05:44:02.712 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 05:44:02.714 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 05:44:02.717 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:44:02.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:44:02.718 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:44:02.719 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 05:44:02.719 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 05:44:02.720 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 05:44:02.721 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 05:44:02.721 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 05:44:02.727 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 05:44:02.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:44:02.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 05:44:02.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:44:02.934 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 05:44:02.935 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 05:44:02.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 05:44:02.936 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:44:02.937 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 05:44:02.937 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 05:44:02.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:44:02.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:44:02.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:44:02.939 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:44:02.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:44:02.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:44:02.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:44:02.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:44:02.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:44:02.942 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:44:02.946 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:ff:00:98:90:60:ca:c4:31:47:65:38:c7:5a:c5:e9:cc:2e:3a:8e] modulus: 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 public exponent: 10001 ]