By type
2022-06-07 15:11:41,600 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-07 15:11:42,739 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-07 15:11:43.500 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 07, 2022 3:11:45 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 07, 2022 3:11:45 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 07, 2022 3:11:45 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 07, 2022 3:11:45 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-07 15:11:46.260 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-07 15:11:46.561 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-07 15:11:46.738 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-07 15:11:47.508 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-07 15:11:47.511 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-07 15:11:47.512 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-07 15:11:47.516 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-07 15:11:47.557 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-07 15:11:47.560 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-07 15:11:47.691 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-07 15:11:48.377 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 07, 2022 3:11:49 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-07 15:11:49.413 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.712 seconds (JVM running for 10.657) Jun 07, 2022 3:12:15 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-07 15:12:55.241 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 15:12:55.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 15:12:55.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 15:12:55.306 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 15:12:55.324 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 15:12:55.328 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 15:12:55.329 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 15:12:55.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 15:12:55.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 15:12:55.336 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 15:12:55.344 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 15:12:55.347 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 15:12:55.393 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 15:12:55.401 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 15:12:55.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 15:12:55.406 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 15:13:05.951 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 15:13:05.955 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 15:13:05.955 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 15:13:05.957 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 15:13:05.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 15:13:05.973 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 15:13:05.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 15:13:05.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 15:13:05.978 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 15:13:05.994 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 15:13:05.995 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 15:13:05.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 15:13:06.005 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 15:13:06.006 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 15:13:06.007 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 15:13:06.010 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 15:13:06.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:9e:74:88:b8:e6:a4:58:08:65:2c:6d:6c:fd:1a:67:f0:4e:61:88] modulus: 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 public exponent: 10001 ] 2022-06-07 16:43:36.218 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 16:43:36.221 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 16:43:36.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:43:36.232 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 16:43:36.239 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:43:36.241 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 16:43:36.242 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 16:43:36.243 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 16:43:36.244 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 16:43:36.245 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 16:43:36.254 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 16:43:36.255 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:43:36.256 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:43:36.256 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:43:36.579 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 16:43:36.580 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 16:43:36.581 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 16:43:36.581 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:43:36.585 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 16:43:36.586 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 16:43:36.587 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:43:36.587 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:43:36.588 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:43:36.589 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:43:36.590 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:43:36.590 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:43:36.591 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:43:36.592 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:43:36.592 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:43:36.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 16:43:36.599 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d9:c4:9b:f1:2c:ba:4e:3d:55:95:5e:38:7f:b9:1e:9a:85:e5:f3:b1] modulus: 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 public exponent: 10001 ] 2022-06-07 16:45:23.912 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 16:45:23.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 16:45:23.915 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 16:45:23.916 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 16:45:23.916 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 16:45:23.917 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 16:45:23.917 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 16:45:23.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 16:45:23.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 16:45:23.919 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 16:45:23.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 16:45:23.928 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:45:23.929 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:45:23.929 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:45:24.105 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 16:45:24.106 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 16:45:24.106 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 16:45:24.107 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:45:24.113 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 16:45:24.113 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 16:45:24.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:45:24.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:45:24.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:45:24.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:45:24.117 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:45:24.117 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:45:24.118 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:45:24.118 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:45:24.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:45:24.120 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 16:45:24.125 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:cc:eb:49:18:fd:8c:63:0e:1c:fa:86:09:f3:83:4b:c3:1d:50:81] modulus: b7507a4adc6feea92922c16dcf4373b2bcde92008802646280606d9f8096938a0b27864a7320d267343c3ff9ca260df2d3d423a8795766807fb883e0de0cdeaa6ead72187819db8c965e7e74541fd31094a90419a70914b1b906aa2b4c1eb6e70c8df53e5c9caf1caee7adcf9b164ea3917dbdf94ca746e00cb4f5d85d21892c810d4b9c17d9ec06ebabd1ec97f2de3efcfc52e7b7bd9640e90df0482347d48e169a4e031efbbf0e82215e7befc372a6d4fb8ffa03c9982ffc5c877dc47d21f7c4accaee42d7c40cded455cd92b0e5c125957d94caf08f3134d4e161c05c623acc9bd70a70d863f12fbc32f8330f58dee2594b84af9f18d01db2f12ae732aaad public exponent: 10001 ] 2022-06-07 16:46:54.050 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 16:46:54.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 16:46:54.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 16:46:54.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 16:46:54.055 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 16:46:54.056 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 16:46:54.056 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 16:46:54.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 16:46:54.057 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 16:46:54.057 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 16:46:54.062 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 16:46:54.063 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:46:54.063 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:46:54.063 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:46:54.255 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 16:46:54.256 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 16:46:54.256 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 16:46:54.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:46:54.259 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 16:46:54.259 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 16:46:54.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:46:54.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:46:54.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:46:54.261 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:46:54.261 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:46:54.262 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:46:54.262 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:46:54.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:46:54.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:46:54.265 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 16:46:54.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: b401d071b6e94672d8d268ec1510871d03e59c770ac45b55fa538c73b33bfba5272ff5fec397107aca5bed4c5e7e4b3b55393ae2555b1a277cbf12de810efb081fce58c27eea878951d16603d015c4e66a08e80e39b0b54603a5d8b21db37cf47e099abeb09cdeaa877630bee9ab20575c3cf82d3e5aa3a6a944d7423e938e04bbb553186e4d95f7dc80cf02f3ce7801676f854076ded69179e72f0ee4326ba97bf2be03057d4b666745937f07cc1294f8a3ac5ff77aef294522026736f65a81960b03877c7894b804a978b42c479319d51401e84c10d3eacd032ae20d3ec621721b203c6bed364a54ae05cf0ed92c4c25249382f9c6fcd3ffdef6e28b3282b37d478289036761e908e5a1bc6db6155d827d42c641f7da5569984b0e6927b1a77d421c9ef02a72871cb65d3649e70ecd5403d96ee70865a1727615102ef10188d8c4da6ff1d215355404377961efbd847f6bd81569ae424804e826ffde5e6053486323f4bd39e607178f98d78ff3a216f517228f53c92fffb00a9cf0f4d259b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:85:ea:2c:5f:1b:d4:19:98:69:45:53:c9:98:56:86:6c:76:98:c8] modulus: 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 public exponent: 10001 ] 2022-06-07 16:48:55.007 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 16:48:55.009 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 16:48:55.010 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:48:55.011 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 16:48:55.012 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:48:55.013 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 16:48:55.013 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 16:48:55.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 16:48:55.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 16:48:55.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 16:48:55.019 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 16:48:55.020 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:48:55.020 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:48:55.021 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:48:55.216 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 16:48:55.217 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 16:48:55.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 16:48:55.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:48:55.220 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 16:48:55.220 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 16:48:55.220 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:48:55.221 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:48:55.221 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:48:55.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:48:55.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:48:55.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:48:55.223 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:48:55.223 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:48:55.223 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:48:55.224 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 16:48:55.228 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: b401d071b6e94672d8d268ec1510871d03e59c770ac45b55fa538c73b33bfba5272ff5fec397107aca5bed4c5e7e4b3b55393ae2555b1a277cbf12de810efb081fce58c27eea878951d16603d015c4e66a08e80e39b0b54603a5d8b21db37cf47e099abeb09cdeaa877630bee9ab20575c3cf82d3e5aa3a6a944d7423e938e04bbb553186e4d95f7dc80cf02f3ce7801676f854076ded69179e72f0ee4326ba97bf2be03057d4b666745937f07cc1294f8a3ac5ff77aef294522026736f65a81960b03877c7894b804a978b42c479319d51401e84c10d3eacd032ae20d3ec621721b203c6bed364a54ae05cf0ed92c4c25249382f9c6fcd3ffdef6e28b3282b37d478289036761e908e5a1bc6db6155d827d42c641f7da5569984b0e6927b1a77d421c9ef02a72871cb65d3649e70ecd5403d96ee70865a1727615102ef10188d8c4da6ff1d215355404377961efbd847f6bd81569ae424804e826ffde5e6053486323f4bd39e607178f98d78ff3a216f517228f53c92fffb00a9cf0f4d259b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:ac:27:23:af:ca:42:fe:73:8d:25:4f:11:ac:2c:bd:78:5b:9d:32] modulus: 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 public exponent: 10001 ] 2022-06-07 16:52:25.058 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 16:52:25.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 16:52:25.063 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:52:25.064 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 16:52:25.064 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:52:25.065 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 16:52:25.066 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 16:52:25.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 16:52:25.067 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 16:52:25.067 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 16:52:25.074 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 16:52:25.076 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:52:25.076 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:52:25.077 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:52:25.248 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 16:52:25.249 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 16:52:25.250 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 16:52:25.250 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:52:25.252 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 16:52:25.253 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 16:52:25.253 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:52:25.254 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:52:25.254 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:52:25.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:52:25.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:52:25.257 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:52:25.258 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:52:25.258 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:52:25.259 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:52:25.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 16:52:25.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:d1:fe:11:bf:28:78:fe:57:c5:73:ff:9f:52:df:ab:85:4d:06:fd] modulus: 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 public exponent: 10001 ] 2022-06-07 16:57:19.839 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 16:57:19.842 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 16:57:19.844 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:57:19.845 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 16:57:19.846 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 16:57:19.846 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 16:57:19.847 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 16:57:19.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 16:57:19.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 16:57:19.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 16:57:19.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 16:57:19.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:57:19.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 16:57:19.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:57:20.003 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 16:57:20.004 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 16:57:20.004 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 16:57:20.005 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 16:57:20.007 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 16:57:20.007 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 16:57:20.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:57:20.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:57:20.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:57:20.010 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:57:20.011 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:57:20.012 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:57:20.013 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 16:57:20.013 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 16:57:20.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 16:57:20.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 16:57:20.019 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:06:cd:99:a1:36:2c:ff:4a:3d:af:7b:6d:fd:0e:13:65:c4:4a:1b] modulus: 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 public exponent: 10001 ] 2022-06-07 17:00:37.101 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:00:37.104 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:00:37.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 17:00:37.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:00:37.108 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 17:00:37.109 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:00:37.109 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:00:37.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:00:37.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:00:37.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:00:37.117 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:00:37.118 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:00:37.118 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:00:37.119 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:00:37.370 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:00:37.371 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:00:37.371 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:00:37.372 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:00:37.373 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:00:37.373 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:00:37.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:00:37.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:00:37.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:00:37.375 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:00:37.375 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:00:37.376 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:00:37.376 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:00:37.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:00:37.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:00:37.378 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:00:37.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:fd:58:f1:cc:16:b1:e2:0b:9e:dc:50:7a:9a:03:f7:d1:65:21:ef] modulus: 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 public exponent: 10001 ] 2022-06-07 17:01:28.331 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:01:28.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:01:28.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:01:28.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:01:28.334 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:01:28.335 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:01:28.335 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:01:28.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:01:28.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:01:28.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:01:28.341 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:01:28.341 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:01:28.342 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:01:28.342 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:01:28.550 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:01:28.551 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:01:28.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:01:28.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:01:28.554 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:01:28.554 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:01:28.555 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:01:28.555 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:01:28.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:01:28.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:01:28.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:01:28.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:01:28.558 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:01:28.559 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:01:28.559 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:01:28.560 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:01:28.564 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:a8:33:00:be:f9:b2:51:24:49:bc:f1:08:46:a7:92:21:44:54:86] modulus: 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 public exponent: 10001 ] 2022-06-07 17:05:11.293 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:05:11.294 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:05:11.299 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:05:11.300 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:05:11.300 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:05:11.301 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:05:11.302 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:05:11.302 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:05:11.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:05:11.304 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:05:11.311 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:05:11.312 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:05:11.312 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:05:11.313 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:05:11.479 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:05:11.480 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:05:11.480 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:05:11.481 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:05:11.482 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:05:11.483 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:05:11.483 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:05:11.483 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:05:11.484 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:05:11.484 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:05:11.484 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:05:11.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:05:11.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:05:11.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:05:11.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:05:11.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:05:11.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:93:b0:2d:f4:77:4d:c3:94:fe:99:98:88:a5:3f:40:b0:0c:24:70] modulus: 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 public exponent: 10001 ] 2022-06-07 17:07:05.888 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:07:05.890 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:07:05.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 17:07:05.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:07:05.893 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 17:07:05.894 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:07:05.894 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:07:05.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:07:05.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:07:05.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:07:05.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:07:05.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:07:05.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:07:05.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:07:06.138 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:07:06.138 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:07:06.139 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:07:06.139 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:07:06.140 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:07:06.140 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:07:06.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:07:06.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:07:06.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:07:06.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:07:06.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:07:06.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:07:06.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:07:06.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:07:06.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:07:06.144 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:07:06.147 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:43:2e:9d:79:c1:d2:f3:7f:b8:30:c4:3a:7a:76:cd:47:81:c7:a9] modulus: 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 public exponent: 10001 ] 2022-06-07 17:07:21.661 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:07:21.662 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:07:21.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 17:07:21.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:07:21.665 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 17:07:21.666 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:07:21.666 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:07:21.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:07:21.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:07:21.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:07:21.672 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:07:21.673 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:07:21.673 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:07:21.673 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:07:21.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:07:21.859 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:07:21.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:07:21.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:07:21.861 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:07:21.861 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:07:21.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:07:21.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:07:21.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:07:21.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:07:21.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:07:21.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:07:21.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:07:21.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:07:21.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:07:21.867 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:07:21.872 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:ad:a9:7c:04:2b:d6:c1:63:fa:ad:1a:51:7b:e0:00:58:9f:dd:64] modulus: da94408a81eb3e4345934fc4bce6028a710ee5758c9238ac7b232f35fac51b93de682ffa8105d49f06fe49a571bdf5f5dc2ce6f710787ed59fcfb76425bf4ffa7ff45df2b4a15a086d674e318d74ff2aabbc21ba4d79ba0a079ef4eb7accd55f3d476cb0872388b1221028035a0db4c4a59e6045cf834169894ea3d7bed8c3c4d82fe4572705a58eae49380bf4771c254446711e635da86ef999649ece8c8feb5477d6082777fd86b855337c333a2e5f576b10f56ec7140b9ccf09a54c9ee4836e9f5463cbcb5e361f82a60302403d582692f3814d6c859385c0eb054746150080c0747bc20a96d49f39cfaab85ed1bf58badf0490d08ef87dfa27e16c60eff1 public exponent: 10001 ] 2022-06-07 17:10:06.340 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:10:06.342 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:10:06.343 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:10:06.344 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:10:06.344 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:10:06.345 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:10:06.345 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:10:06.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:10:06.346 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:10:06.346 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:10:06.351 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:10:06.351 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:10:06.352 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:10:06.352 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:10:06.589 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:10:06.589 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:10:06.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:10:06.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:10:06.592 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:10:06.592 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:10:06.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:10:06.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:10:06.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:10:06.594 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:10:06.594 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:10:06.594 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:10:06.595 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:10:06.595 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:10:06.595 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:10:06.596 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:10:06.599 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: b401d071b6e94672d8d268ec1510871d03e59c770ac45b55fa538c73b33bfba5272ff5fec397107aca5bed4c5e7e4b3b55393ae2555b1a277cbf12de810efb081fce58c27eea878951d16603d015c4e66a08e80e39b0b54603a5d8b21db37cf47e099abeb09cdeaa877630bee9ab20575c3cf82d3e5aa3a6a944d7423e938e04bbb553186e4d95f7dc80cf02f3ce7801676f854076ded69179e72f0ee4326ba97bf2be03057d4b666745937f07cc1294f8a3ac5ff77aef294522026736f65a81960b03877c7894b804a978b42c479319d51401e84c10d3eacd032ae20d3ec621721b203c6bed364a54ae05cf0ed92c4c25249382f9c6fcd3ffdef6e28b3282b37d478289036761e908e5a1bc6db6155d827d42c641f7da5569984b0e6927b1a77d421c9ef02a72871cb65d3649e70ecd5403d96ee70865a1727615102ef10188d8c4da6ff1d215355404377961efbd847f6bd81569ae424804e826ffde5e6053486323f4bd39e607178f98d78ff3a216f517228f53c92fffb00a9cf0f4d259b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:d4:eb:89:20:75:ce:6d:15:10:02:70:5e:15:85:28:52:fa:9f:aa] modulus: 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 public exponent: 10001 ] 2022-06-07 17:14:17.134 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:14:17.137 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:14:17.139 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:14:17.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:14:17.140 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:14:17.141 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:14:17.142 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:14:17.142 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:14:17.142 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:14:17.143 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:14:17.148 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:14:17.148 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:14:17.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:14:17.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:14:17.307 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:14:17.308 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:14:17.308 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:14:17.308 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:14:17.310 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:14:17.310 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:14:17.310 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:14:17.311 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:14:17.311 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:14:17.311 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:14:17.312 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:14:17.312 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:14:17.313 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:14:17.313 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:14:17.313 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:14:17.314 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:14:17.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:21:d2:60:1e:01:55:e1:f0:42:8a:84:70:3a:81:51:e2:cc:8c:b0] modulus: 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 public exponent: 10001 ] 2022-06-07 17:18:23.845 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:18:23.847 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:18:23.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:18:23.849 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:18:23.850 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:18:23.850 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:18:23.851 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:18:23.851 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:18:23.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:18:23.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:18:23.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:18:23.859 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:18:23.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:18:23.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:18:24.082 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:18:24.083 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:18:24.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:18:24.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:18:24.085 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:18:24.085 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:18:24.085 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:18:24.085 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:18:24.085 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:18:24.086 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:18:24.086 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:18:24.087 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:18:24.087 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:18:24.087 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:18:24.088 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:18:24.089 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:18:24.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:15:df:23:24:fc:7a:a7:78:cf:4e:d0:fe:ea:af:9c:71:51:19:5f] modulus: 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 public exponent: 10001 ] 2022-06-07 17:23:06.095 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:23:06.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:23:06.101 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:23:06.102 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:23:06.102 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:23:06.103 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:23:06.103 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:23:06.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:23:06.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:23:06.105 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:23:06.110 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:23:06.111 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:23:06.112 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:23:06.112 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:23:06.398 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:23:06.399 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:23:06.399 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:23:06.399 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:23:06.401 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:23:06.401 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:23:06.401 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:23:06.402 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:23:06.402 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:23:06.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:23:06.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:23:06.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:23:06.404 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:23:06.404 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:23:06.404 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:23:06.405 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:23:06.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:13:7e:2d:4a:a1:f6:e7:d6:06:36:fb:55:d3:31:01:de:dd:26:22] modulus: c487040977ed61cb6b677ff0d6ce716c220bb49f8eca285e7ee596a3849c6c2686347bc300fbe3ec32e9b99bafd9da8dec45ec21bb7493a51276145e2f3edf71c392ce1a2271c0d1c0212a6e1babcccb7b98be9f3f41457a5e757e2ffe189a7feb29cff5c3250abc5ae100247362306ec6670df5e15541b507f39be44d51b97529ebb8910c24a45e776600d8c10a51efee580b0c0ac0f68001aedae5777761707812cc82d99167de16cef6dd43677dd69b25515c42d2eaf83675f0b0b19ba69ad0acdc40c2c1257fd03df74364a0d68ad748bec608e682c442bedaf721b82c225eca334501ec437329925c6b7a85823e65f1a45de4731e4aa44a0552ce59fbe3 public exponent: 10001 ] 2022-06-07 17:27:02.944 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 17:27:02.946 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 17:27:02.948 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:27:02.949 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 17:27:02.949 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 17:27:02.949 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 17:27:02.950 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 17:27:02.950 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 17:27:02.950 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 17:27:02.952 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 17:27:02.956 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 17:27:02.957 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:27:02.957 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 17:27:02.957 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:27:03.094 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 17:27:03.095 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 17:27:03.095 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 17:27:03.096 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 17:27:03.097 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 17:27:03.097 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 17:27:03.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:27:03.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:27:03.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:27:03.099 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:27:03.099 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:27:03.099 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:27:03.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 17:27:03.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 17:27:03.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 17:27:03.101 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 17:27:03.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 702066981510815576118249393141938859391904695434 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 15:09:14 UTC 2022 Final Date: Sun Jun 06 15:09:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:0a:64:b1:38:62:a4:35:15:1e:c5:b8:79:23:e6:9a:96:dd:a8:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8aa35717edb311ea6a1e359db5b8849db1fc2750 0b6b647014ca19e122caf99f92f7c908456525af ef56d246ca68dd7345a8ad9598c64cf0a68fe5ec 8cbf09aaedcb38c9cd6275a6f51d4cf6033c2115 2e693a7245966dc3808a4c30a9e09442ad2128aa 36502cbf6f43810af9b00fd9dc1049fc66a48a9a 54ba781f9cef1aa2e3aed8399d79848298cb2aa2 60e83c32ee38cffefb1b47a672ed6c775ed9a906 35f1c85b2fdce1f068a47af5eefaa351c3c03669 9269f8f1b6ed8703fd2b0ececa1e44a6776662ae efada2d896482b11cfa3d5d8d066fa85788a5804 2861e9fa0f0174a72aea10783dd3d8762a0b0cfd c7229a385340159f3f18131e4cbacdd5c5626aeb 883f0f6ea6523d7690ef9ad48442feaf74d7764f 74807985244da28f35753b97462a074f4068094d cb6069ab5fec8267258f89ff2006a6766182cfc6 3cef637b628cfaee862b0f0f13960c59766d10d1 712836c0e956994cbab3f9cdc81e8cb844483a24 b6c4f6c42c039b82c9e5fb6782df157af62ffd40 8b7d561b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:82:c1:ff:99:fb:27:6d:e4:87:d6:41:1f:23:d4:05:91:c6:94:80] modulus: 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 public exponent: 10001 ]