By type
2022-06-10 03:18:31,978 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-10 03:18:33,390 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-10 03:18:34.449 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 10, 2022 3:18:36 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 10, 2022 3:18:36 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 10, 2022 3:18:36 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 10, 2022 3:18:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-10 03:18:37.788 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-10 03:18:38.104 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-10 03:18:38.345 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-10 03:18:39.235 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-10 03:18:39.238 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-10 03:18:39.240 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-10 03:18:39.244 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-10 03:18:39.288 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-10 03:18:39.292 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-10 03:18:39.476 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-10 03:18:40.184 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 10, 2022 3:18:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-10 03:18:41.391 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.535 seconds (JVM running for 12.805) Jun 10, 2022 3:19:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-10 03:19:42.533 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 03:19:42.546 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 03:19:42.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-10 03:19:42.597 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 03:19:42.626 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-10 03:19:42.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 03:19:42.630 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 03:19:42.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 03:19:42.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 03:19:42.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 03:19:42.646 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 03:19:42.651 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 03:19:42.696 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 03:19:42.704 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 03:19:42.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 03:19:42.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 03:19:43.456 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 03:19:43.460 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 03:19:43.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 03:19:43.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 03:19:43.476 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 03:19:43.478 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 03:19:43.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 03:19:43.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 03:19:43.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 03:19:43.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 03:19:43.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 03:19:43.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 03:19:43.514 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 03:19:43.515 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 03:19:43.515 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 03:19:43.518 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 03:19:43.551 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:9c:4e:57:d7:fa:fd:8d:30:b2:a4:2b:ef:a0:bd:0e:67:6d:44:f5] modulus: 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 public exponent: 10001 ] 2022-06-10 04:41:05.768 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 04:41:05.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 04:41:05.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:41:05.778 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 04:41:05.779 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:41:05.780 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 04:41:05.780 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 04:41:05.781 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 04:41:05.786 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 04:41:05.789 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 04:41:05.812 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 04:41:05.814 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:41:05.815 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:41:05.816 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:41:06.162 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 04:41:06.163 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 04:41:06.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 04:41:06.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:41:06.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 04:41:06.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 04:41:06.169 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:41:06.169 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:41:06.170 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:41:06.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:41:06.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:41:06.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:41:06.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:41:06.174 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:41:06.174 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:41:06.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 04:41:06.182 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:b3:44:f0:6b:15:b0:9e:ca:28:b1:9f:f1:b6:8a:4e:7b:98:9b:c0] modulus: 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 public exponent: 10001 ] 2022-06-10 04:42:54.260 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 04:42:54.262 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 04:42:54.266 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-10 04:42:54.267 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 04:42:54.268 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-10 04:42:54.269 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 04:42:54.269 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 04:42:54.270 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 04:42:54.271 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 04:42:54.272 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 04:42:54.281 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 04:42:54.282 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:42:54.282 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:42:54.283 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:42:54.488 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 04:42:54.489 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 04:42:54.489 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 04:42:54.489 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:42:54.492 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 04:42:54.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 04:42:54.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:42:54.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:42:54.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:42:54.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:42:54.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:42:54.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:42:54.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:42:54.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:42:54.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:42:54.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 04:42:54.507 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:3b:56:10:31:8c:0c:d5:45:63:08:f4:b2:58:1d:40:09:5d:62:fd] modulus: bc8271e622eb740a53ee0356238f6b9fc339b87cc2254ebb56a7cb44fec9f7a4c4bfc35e80af472e72baeb588983990eadb8b12b9d4aa3933031ae047eb4bff1806dda6c3d481604bd6d6799946f47d18203781ffb3d60450262b48e55ac988565330639e0ad4d7ac5ad600c9423989e6c2180544d105c0608717725378d29d2603b2bfe81fa57a123a908cbf6f341533cb1624ed8c397efdd202190e6e0a43767ce32f7feecf767550b1d45e39a49d1df3050038db5e1caeb7bc2ae34b97b87a98881919f9d08af6090171e61ee597a1b0f36d8cdaa8b36545a77ee4a60470552020ea4aa294b4a35c9913a10b14730632a073ab62e118cf305fea6d7ce9b8d public exponent: 10001 ] 2022-06-10 04:45:20.792 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 04:45:20.804 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 04:45:20.815 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-10 04:45:20.817 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 04:45:20.818 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-10 04:45:20.820 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 04:45:20.821 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 04:45:20.821 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 04:45:20.828 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 04:45:20.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 04:45:20.840 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 04:45:20.842 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:45:20.842 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:45:20.843 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:45:21.198 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 04:45:21.199 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 04:45:21.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 04:45:21.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:45:21.204 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 04:45:21.204 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 04:45:21.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:45:21.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:45:21.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:45:21.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:45:21.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:45:21.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:45:21.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:45:21.212 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:45:21.212 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:45:21.213 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 04:45:21.219 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:43:04:12:fa:6c:4e:f3:91:34:51:41:77:a2:a2:1f:0c:99:1a:84] modulus: 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 public exponent: 10001 ] 2022-06-10 04:47:22.423 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 04:47:22.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 04:47:22.429 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:47:22.430 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 04:47:22.431 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:47:22.432 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 04:47:22.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 04:47:22.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 04:47:22.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 04:47:22.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 04:47:22.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 04:47:22.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:47:22.444 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:47:22.444 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:47:22.862 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 04:47:22.864 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 04:47:22.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 04:47:22.866 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:47:22.869 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 04:47:22.871 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 04:47:22.873 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:47:22.874 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:47:22.875 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:47:22.877 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:47:22.877 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:47:22.878 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:47:22.880 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:47:22.880 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:47:22.883 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:47:22.885 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 04:47:22.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:22:60:56:35:d3:db:0c:a0:b8:79:04:f6:ea:16:2e:16:eb:1e:34] modulus: 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 public exponent: 10001 ] 2022-06-10 04:51:40.856 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 04:51:40.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 04:51:40.865 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:51:40.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 04:51:40.868 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:51:40.869 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 04:51:40.869 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 04:51:40.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 04:51:40.871 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 04:51:40.872 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 04:51:40.889 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 04:51:40.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:51:40.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:51:40.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:51:41.233 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 04:51:41.235 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 04:51:41.235 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 04:51:41.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:51:41.238 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 04:51:41.239 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 04:51:41.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:51:41.242 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:51:41.244 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:51:41.245 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:51:41.246 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:51:41.247 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:51:41.248 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:51:41.249 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:51:41.249 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:51:41.250 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 04:51:41.258 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:33:43:4c:f4:37:79:75:64:0f:a0:db:e8:70:b2:42:c1:95:2f:52] modulus: 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 public exponent: 10001 ] 2022-06-10 04:56:41.622 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 04:56:41.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 04:56:41.636 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:56:41.637 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 04:56:41.638 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 04:56:41.639 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 04:56:41.639 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 04:56:41.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 04:56:41.641 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 04:56:41.642 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 04:56:41.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 04:56:41.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:56:41.651 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 04:56:41.651 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:56:41.937 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 04:56:41.938 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 04:56:41.938 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 04:56:41.939 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 04:56:41.941 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 04:56:41.942 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 04:56:41.942 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:56:41.946 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:56:41.946 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:56:41.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:56:41.960 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:56:41.961 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:56:41.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 04:56:41.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 04:56:41.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 04:56:41.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 04:56:41.970 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:ba:d2:c5:4b:c1:90:fb:e4:26:76:66:cc:78:47:8a:1e:43:2b:96] modulus: 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 public exponent: 10001 ] 2022-06-10 05:01:41.462 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:01:41.464 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:01:41.467 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:01:41.469 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:01:41.469 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:01:41.472 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:01:41.472 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:01:41.473 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:01:41.473 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:01:41.474 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:01:41.481 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:01:41.482 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:01:41.482 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:01:41.483 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:01:41.798 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:01:41.800 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:01:41.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:01:41.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:01:41.805 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:01:41.806 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:01:41.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:01:41.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:01:41.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:01:41.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:01:41.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:01:41.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:01:41.825 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:01:41.826 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:01:41.826 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:01:41.828 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:01:41.836 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: d849cf40da09eadd536bc62b7860eed9f6ca4e550def74d0bdd39add7ff138e2b4eb28d8702e9b61541b233a166098cbeaf144a2b58c66e80cb832cbb3276d68dae2edb535077effec6fb4adf2871557879e90e4a5e0e3182721a8b9a167b83a416e787ad912ed16f7f288b12a8ec46abb1ef650eb7400e76b0a72b35cb455d09eca7a5c2351f9efca0002134f65b7bb778fea659e1d2809ae88a8e607ddcd993fe724332d48a690e4bcf5502588250e420b6b1df1f24831842034e7746096f4033e2009ec83d40d52c471a79cafeddb98ab8a6bed2129f91d152c77b3701d98fd519b0dd0e50f93cbc4b80dcd108be9ad205a0a6790a53ae8f93e68a165e6b2de2d2ec64ba9097adde93e34dbc75157db2069a61180ed8c0fe51c207db642e48af6217e66c97b67d5221337883f501afcc9ec7ebfd41bd89a4e8d2a5b346d0b8bff17ee231fdea192680269872c336d09826af3a0d5ff7b8e6d45f53116b81c0fc2462d96eb6b96371df923da6da3cd0088dc2a8000bf8e128b77336b3e3ce5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:bd:db:41:f6:20:5f:fd:01:e5:5e:fd:14:c3:76:dd:44:e0:c6:e1] modulus: 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 public exponent: 10001 ] 2022-06-10 05:05:45.115 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:05:45.118 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:05:45.121 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:05:45.122 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:05:45.123 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:05:45.124 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:05:45.124 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:05:45.124 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:05:45.125 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:05:45.126 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:05:45.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:05:45.135 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:05:45.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:05:45.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:05:45.383 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:05:45.384 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:05:45.384 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:05:45.385 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:05:45.387 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:05:45.388 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:05:45.389 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:05:45.389 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:05:45.390 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:05:45.391 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:05:45.392 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:05:45.392 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:05:45.393 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:05:45.394 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:05:45.394 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:05:45.395 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:05:45.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:50:b7:df:65:7b:08:6f:a8:6c:04:23:6e:19:f7:07:c3:26:8b:88] modulus: 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 public exponent: 10001 ] 2022-06-10 05:09:10.269 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:09:10.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:09:10.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-10 05:09:10.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:09:10.275 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-10 05:09:10.276 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:09:10.277 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:09:10.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:09:10.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:09:10.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:09:10.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:09:10.288 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:09:10.288 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:09:10.289 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:09:10.918 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:09:10.919 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:09:10.920 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:09:10.920 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:09:10.923 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:09:10.924 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:09:10.925 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:09:10.925 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:09:10.927 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:09:10.929 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:09:10.933 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:09:10.935 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:09:10.943 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:09:10.944 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:09:10.944 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:09:10.955 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:09:10.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:d3:56:27:05:34:ad:ff:9d:ab:53:37:8e:98:71:25:ca:b8:0c:35] modulus: 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 public exponent: 10001 ] 2022-06-10 05:11:10.707 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:11:10.711 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:11:10.719 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:11:10.721 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:11:10.722 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:11:10.723 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:11:10.723 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:11:10.724 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:11:10.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:11:10.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:11:10.741 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:11:10.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:11:10.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:11:10.748 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:11:11.188 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:11:11.190 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:11:11.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:11:11.193 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:11:11.214 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:11:11.220 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:11:11.224 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:11:11.225 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:11:11.225 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:11:11.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:11:11.228 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:11:11.228 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:11:11.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:11:11.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:11:11.230 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:11:11.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:11:11.272 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:b9:a8:86:30:ba:8b:3d:ec:f1:cf:ce:f5:f4:12:54:7b:60:c6:b1] modulus: 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 public exponent: 10001 ] 2022-06-10 05:16:46.980 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:16:46.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:16:46.988 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:16:46.991 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:16:46.991 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:16:46.992 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:16:46.993 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:16:46.993 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:16:46.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:16:46.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:16:47.001 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:16:47.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:16:47.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:16:47.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:16:47.283 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:16:47.284 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:16:47.284 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:16:47.284 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:16:47.286 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:16:47.286 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:16:47.287 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:16:47.287 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:16:47.288 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:16:47.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:16:47.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:16:47.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:16:47.291 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:16:47.292 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:16:47.292 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:16:47.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:16:47.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:d2:0c:ca:72:a8:a4:c1:f7:77:0a:01:ec:a8:3e:9f:02:28:f4:53] modulus: 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 public exponent: 10001 ] 2022-06-10 05:17:01.122 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:17:01.124 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:17:01.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-10 05:17:01.128 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:17:01.133 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-10 05:17:01.136 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:17:01.137 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:17:01.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:17:01.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:17:01.139 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:17:01.165 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:17:01.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:17:01.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:17:01.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:17:02.370 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:17:02.371 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:17:02.372 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:17:02.372 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:17:02.376 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:17:02.377 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:17:02.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:17:02.378 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:17:02.378 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:17:02.379 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:17:02.379 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:17:02.380 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:17:02.381 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:17:02.381 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:17:02.381 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:17:02.382 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:17:02.386 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:1b:6e:60:02:fb:c9:2e:2e:c3:94:31:7a:c5:a9:6c:0c:27:c9:77] modulus: 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 public exponent: 10001 ] 2022-06-10 05:17:27.096 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:17:27.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:17:27.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-10 05:17:27.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:17:27.106 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-10 05:17:27.107 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:17:27.108 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:17:27.108 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:17:27.109 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:17:27.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:17:27.118 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:17:27.119 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:17:27.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:17:27.125 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:17:27.546 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:17:27.549 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:17:27.550 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:17:27.550 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:17:27.556 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:17:27.557 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:17:27.558 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:17:27.559 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:17:27.559 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:17:27.560 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:17:27.561 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:17:27.561 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:17:27.562 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:17:27.562 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:17:27.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:17:27.564 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:17:27.574 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:27:fa:3b:2c:8b:cf:6a:a0:d4:83:eb:28:17:df:1b:dc:ef:a6:54] modulus: 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 public exponent: 10001 ] 2022-06-10 05:22:21.958 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:22:21.963 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:22:21.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:22:21.973 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:22:21.974 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:22:21.975 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:22:21.976 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:22:21.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:22:21.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:22:21.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:22:21.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:22:21.998 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:22:21.998 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:22:21.999 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:22:22.368 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:22:22.369 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:22:22.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:22:22.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:22:22.372 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:22:22.373 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:22:22.374 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:22:22.374 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:22:22.374 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:22:22.376 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:22:22.377 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:22:22.377 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:22:22.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:22:22.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:22:22.379 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:22:22.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:22:22.390 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: d849cf40da09eadd536bc62b7860eed9f6ca4e550def74d0bdd39add7ff138e2b4eb28d8702e9b61541b233a166098cbeaf144a2b58c66e80cb832cbb3276d68dae2edb535077effec6fb4adf2871557879e90e4a5e0e3182721a8b9a167b83a416e787ad912ed16f7f288b12a8ec46abb1ef650eb7400e76b0a72b35cb455d09eca7a5c2351f9efca0002134f65b7bb778fea659e1d2809ae88a8e607ddcd993fe724332d48a690e4bcf5502588250e420b6b1df1f24831842034e7746096f4033e2009ec83d40d52c471a79cafeddb98ab8a6bed2129f91d152c77b3701d98fd519b0dd0e50f93cbc4b80dcd108be9ad205a0a6790a53ae8f93e68a165e6b2de2d2ec64ba9097adde93e34dbc75157db2069a61180ed8c0fe51c207db642e48af6217e66c97b67d5221337883f501afcc9ec7ebfd41bd89a4e8d2a5b346d0b8bff17ee231fdea192680269872c336d09826af3a0d5ff7b8e6d45f53116b81c0fc2462d96eb6b96371df923da6da3cd0088dc2a8000bf8e128b77336b3e3ce5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:55:ac:52:0d:c4:55:27:68:22:3d:e9:d4:65:a7:dc:c7:52:94:56] modulus: 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 public exponent: 10001 ] 2022-06-10 05:31:51.622 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:31:51.631 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:31:51.635 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:31:51.646 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:31:51.647 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:31:51.652 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:31:51.654 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:31:51.654 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:31:51.655 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:31:51.656 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:31:51.678 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:31:51.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:31:51.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:31:51.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:31:52.223 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:31:52.224 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:31:52.224 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:31:52.225 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:31:52.242 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:31:52.243 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:31:52.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:31:52.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:31:52.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:31:52.253 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:31:52.253 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:31:52.260 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:31:52.261 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:31:52.262 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:31:52.262 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:31:52.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:31:52.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:fe:e0:6f:7e:e7:44:d8:e1:0d:1a:88:39:96:ea:43:c5:a5:71:57] modulus: dc040eade9690f08c2311309f97c860e3b32e50bcaf384ca1b8e94a8ddf66777ddfb7df560473a8a0f351e362f159a03599f639e8f9bc719bb94579860cebc230e35722277ca3c009b5c97436deed87a6e6b594d64fa1ef4579c835431855b8eef7144237de38827cd1bc389d75b08463b5983e164bd0031a4736f239b9eda568e85f357472bcb2bdde01328d1979b695fec3584f1eae31776d48af103e14a328f0f32c993aa961a350195cc43e7764ec33c2ecffa89d10100e3829eaebb1321bb804f2b4e4d178c5162d20fa43fbd4ce6f372b68cb2596b6b041d0383f7759487710f79772505aeb574dc6677b80b97b8de8cb90e9e5299c05ed0fadc75dbb1 public exponent: 10001 ] 2022-06-10 05:36:48.826 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 05:36:48.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 05:36:48.840 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:36:48.841 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 05:36:48.842 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 05:36:48.842 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 05:36:48.843 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 05:36:48.843 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 05:36:48.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 05:36:48.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 05:36:48.852 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 05:36:48.852 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:36:48.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 05:36:48.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:36:49.091 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 05:36:49.092 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 05:36:49.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 05:36:49.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 05:36:49.095 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 05:36:49.096 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 05:36:49.096 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:36:49.096 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:36:49.097 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:36:49.097 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:36:49.098 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:36:49.098 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:36:49.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 05:36:49.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 05:36:49.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 05:36:49.100 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 05:36:49.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 276475645847386887234437726079458257637053588057 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 03:15:46 UTC 2022 Final Date: Wed Jun 09 03:15:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4e:46:ed:e8:f6:8e:83:4c:21:c0:8f:d7:fa:94:01:da:72:4d:9e:4f] modulus: d849cf40da09eadd536bc62b7860eed9f6ca4e550def74d0bdd39add7ff138e2b4eb28d8702e9b61541b233a166098cbeaf144a2b58c66e80cb832cbb3276d68dae2edb535077effec6fb4adf2871557879e90e4a5e0e3182721a8b9a167b83a416e787ad912ed16f7f288b12a8ec46abb1ef650eb7400e76b0a72b35cb455d09eca7a5c2351f9efca0002134f65b7bb778fea659e1d2809ae88a8e607ddcd993fe724332d48a690e4bcf5502588250e420b6b1df1f24831842034e7746096f4033e2009ec83d40d52c471a79cafeddb98ab8a6bed2129f91d152c77b3701d98fd519b0dd0e50f93cbc4b80dcd108be9ad205a0a6790a53ae8f93e68a165e6b2de2d2ec64ba9097adde93e34dbc75157db2069a61180ed8c0fe51c207db642e48af6217e66c97b67d5221337883f501afcc9ec7ebfd41bd89a4e8d2a5b346d0b8bff17ee231fdea192680269872c336d09826af3a0d5ff7b8e6d45f53116b81c0fc2462d96eb6b96371df923da6da3cd0088dc2a8000bf8e128b77336b3e3ce5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 326621d9a1234d9b2703b5d4fd94b69fbf26d029 0b3a247526a82f72029e460a6abdff71fbfe942d c1f07496f8a6e6c65e2847aca800f80c2f2e4f15 14caae714743ed59f4e87b992532eff0e6bea503 62f3aecab5c21bc47f2de8ae7020a5f936203114 965570fe6f5345a03f0faa12e607dee677d8dcfb 9d1f274768baa409d12cf9208929b6758f16e6a1 557a1a4c56494e01c2eeb05af51b0d8fd3d25050 1e6ca64efab7a88b50975948c437ac634aa716e2 9259aa4320f7dc88c5f1a7e55b1f1c7073b97bfd ca3542896ba2d8a6b17854947967014d9d83b43e 85637babe99547133c89196329b8c75781a52629 936e232156ea600790ae9bd371c388a28fdb569a d93ce5030caa6e919ff8299fa7a2badfa0ec6960 be6ebbd94cfdc87901dd96e1f46bda85bff357a7 3fe55d2a8fdd9d5cf1b7b17565867d733d356b4a 2df613f398e5e8f22d6e163cc1c55ef84a540655 18a96f66c14625544abaff8547a25299d8d1b927 785961d34e6e31498893020f6f4b03c577a34fd0 a420bcc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:b6:3d:04:e5:db:72:b3:57:c5:70:58:9e:4c:7e:e3:02:49:57:98] modulus: ce76dfe79d636c396d2c9fc51305f28535483c9042ac2646dbcc67ff923cac2105674b016a081746cdcb7f48679f44beb1be02039e9f88eae36dfb7b1fdbcc5172c7c35885313964024014d2d75f316f788f0cc23fbe1923b34aeb2f3137cfb993b0d872158d7aad14dd03b2bd98100bb1b9a67a4f8b07762d095b778e15efd950514925d47ab6abb37c7e50d2908f01ba0bf279a1f770f5817e6beefae5fbc97d4c91eeb51278e5b735fc4463d39e27a2799caa40991f15e79d1eab96d212c15014c690d63feeb8414bce3c7f4dfae776bc0919a952ba8f0845feb8e6cf850e511d2a28a45b3f670a449decdf5a201d793113cde25878c37c9a8bb5a7813e4b public exponent: 10001 ]