By type
2022-06-14 16:29:38,243 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-14 16:29:39,861 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-14 16:29:40.937 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 14, 2022 4:29:43 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 14, 2022 4:29:43 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 14, 2022 4:29:43 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 14, 2022 4:29:43 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-14 16:29:44.635 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-14 16:29:45.072 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-14 16:29:45.339 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-14 16:29:46.340 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-14 16:29:46.346 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-14 16:29:46.349 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-14 16:29:46.357 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-14 16:29:46.419 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-14 16:29:46.424 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-14 16:29:46.629 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-14 16:29:47.366 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 14, 2022 4:29:48 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-14 16:29:48.779 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.627 seconds (JVM running for 14.082) Jun 14, 2022 4:30:13 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-14 16:30:28.900 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 16:30:28.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 16:30:28.989 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-14 16:30:28.995 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 16:30:29.019 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-14 16:30:29.022 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 16:30:29.023 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 16:30:29.024 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 16:30:29.025 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 16:30:29.029 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 16:30:29.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 16:30:29.040 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 16:30:29.101 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 16:30:29.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 16:30:29.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 16:30:29.114 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 16:30:29.944 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 16:30:29.948 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 16:30:29.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 16:30:29.950 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 16:30:29.964 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 16:30:29.966 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 16:30:29.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 16:30:29.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 16:30:29.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 16:30:29.988 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 16:30:29.989 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 16:30:29.990 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 16:30:30.001 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 16:30:30.002 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 16:30:30.003 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 16:30:30.005 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 16:30:30.035 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: ad09265aca66d37242a2a880ecb916c3a7208824765971a86b17c2840a767744d5257d6e366769cc4674a4c53adb27137d99908e038e13f563efe8fbb5064d507ee0917af38cb1107593b45a7711a51f848f2d5f343f5938708b727d0ac4146a7f7a28b0546c01fdd930a15f1035d774a555494c50215fefb78d55fad8a567807a5ad00a59d94d28f67ce940b4ca5e35a5eee69262bcebefdc78c3d17244280e6334d0a21a48f6d6fa1903a436de0d4822e77316e9629ffcb63d6648d7147f58df5a9472e32c696e7786a038b5548275444ce987bbc947c338f6315d8bf663fea8b4910beb5a86dabf79f6e113a234a48570940ccb9cddbd1f4865f4b976fa7ac72774251532a0ce64aaa3c506a985bf2bf2c420ef77286146fdeafebce13b16c942ad860821a9db200aca095a1d82a1ef28d42acae6d5d3b4252768e82efc74eaf410c682e4b5dcaa3ffd02f0f178dd67eca568fcaa33fc5d061a309e9a80549f015d9d90c19e33242ca98f6c0ae899f34b15424e61187e1f097a2e86317883 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:a7:b7:f2:6f:35:58:41:9e:88:32:92:c2:50:ac:94:57:18:53:b6] modulus: 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 public exponent: 10001 ] 2022-06-14 17:49:35.626 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 17:49:35.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 17:49:35.632 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:49:35.634 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:49:35.635 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:49:35.636 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 17:49:35.637 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 17:49:35.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 17:49:35.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 17:49:35.639 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 17:49:35.646 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 17:49:35.648 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:49:35.648 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:49:35.649 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:49:36.034 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 17:49:36.036 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 17:49:36.036 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 17:49:36.037 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:49:36.040 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 17:49:36.041 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 17:49:36.042 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:49:36.042 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:49:36.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:49:36.044 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:49:36.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:49:36.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:49:36.046 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:49:36.047 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:49:36.047 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:49:36.049 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:49:36.055 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:2e:df:9e:92:52:f4:ed:86:45:c1:a9:76:0c:60:cc:b0:4a:76:ef] modulus: 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 public exponent: 10001 ] 2022-06-14 17:51:37.828 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 17:51:37.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 17:51:37.836 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-14 17:51:37.838 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:51:37.839 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-14 17:51:37.841 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 17:51:37.842 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 17:51:37.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 17:51:37.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 17:51:37.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 17:51:37.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 17:51:37.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:51:37.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:51:37.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:51:38.104 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 17:51:38.105 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 17:51:38.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 17:51:38.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:51:38.111 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 17:51:38.112 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 17:51:38.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:51:38.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:51:38.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:51:38.120 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:51:38.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:51:38.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:51:38.124 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:51:38.125 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:51:38.125 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:51:38.129 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:51:38.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: ad09265aca66d37242a2a880ecb916c3a7208824765971a86b17c2840a767744d5257d6e366769cc4674a4c53adb27137d99908e038e13f563efe8fbb5064d507ee0917af38cb1107593b45a7711a51f848f2d5f343f5938708b727d0ac4146a7f7a28b0546c01fdd930a15f1035d774a555494c50215fefb78d55fad8a567807a5ad00a59d94d28f67ce940b4ca5e35a5eee69262bcebefdc78c3d17244280e6334d0a21a48f6d6fa1903a436de0d4822e77316e9629ffcb63d6648d7147f58df5a9472e32c696e7786a038b5548275444ce987bbc947c338f6315d8bf663fea8b4910beb5a86dabf79f6e113a234a48570940ccb9cddbd1f4865f4b976fa7ac72774251532a0ce64aaa3c506a985bf2bf2c420ef77286146fdeafebce13b16c942ad860821a9db200aca095a1d82a1ef28d42acae6d5d3b4252768e82efc74eaf410c682e4b5dcaa3ffd02f0f178dd67eca568fcaa33fc5d061a309e9a80549f015d9d90c19e33242ca98f6c0ae899f34b15424e61187e1f097a2e86317883 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:e0:40:ec:6e:92:8e:d8:c3:e2:18:17:0d:b4:63:77:b7:82:ca:05] modulus: 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 public exponent: 10001 ] 2022-06-14 17:52:57.772 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 17:52:57.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 17:52:57.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-14 17:52:57.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:52:57.782 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-14 17:52:57.784 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 17:52:57.784 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 17:52:57.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 17:52:57.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 17:52:57.786 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 17:52:57.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 17:52:57.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:52:57.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:52:57.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:52:58.032 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 17:52:58.033 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 17:52:58.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 17:52:58.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:52:58.038 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 17:52:58.039 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 17:52:58.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:52:58.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:52:58.041 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:52:58.042 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:52:58.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:52:58.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:52:58.044 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:52:58.045 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:52:58.045 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:52:58.047 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:52:58.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:11:17:e5:16:50:d4:33:93:27:35:49:35:39:41:6d:52:04:72:86] modulus: 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 public exponent: 10001 ] 2022-06-14 17:55:40.890 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 17:55:40.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 17:55:40.893 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:55:40.894 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:55:40.897 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:55:40.898 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 17:55:40.899 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 17:55:40.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 17:55:40.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 17:55:40.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 17:55:40.907 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 17:55:40.908 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:55:40.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:55:40.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:55:41.262 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 17:55:41.264 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 17:55:41.264 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 17:55:41.264 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:55:41.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 17:55:41.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 17:55:41.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:55:41.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:55:41.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:55:41.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:55:41.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:55:41.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:55:41.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:55:41.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:55:41.273 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:55:41.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:55:41.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: ad09265aca66d37242a2a880ecb916c3a7208824765971a86b17c2840a767744d5257d6e366769cc4674a4c53adb27137d99908e038e13f563efe8fbb5064d507ee0917af38cb1107593b45a7711a51f848f2d5f343f5938708b727d0ac4146a7f7a28b0546c01fdd930a15f1035d774a555494c50215fefb78d55fad8a567807a5ad00a59d94d28f67ce940b4ca5e35a5eee69262bcebefdc78c3d17244280e6334d0a21a48f6d6fa1903a436de0d4822e77316e9629ffcb63d6648d7147f58df5a9472e32c696e7786a038b5548275444ce987bbc947c338f6315d8bf663fea8b4910beb5a86dabf79f6e113a234a48570940ccb9cddbd1f4865f4b976fa7ac72774251532a0ce64aaa3c506a985bf2bf2c420ef77286146fdeafebce13b16c942ad860821a9db200aca095a1d82a1ef28d42acae6d5d3b4252768e82efc74eaf410c682e4b5dcaa3ffd02f0f178dd67eca568fcaa33fc5d061a309e9a80549f015d9d90c19e33242ca98f6c0ae899f34b15424e61187e1f097a2e86317883 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:50:20:f5:77:f0:0f:cd:b3:6d:c7:aa:24:e9:a5:1e:94:4b:67:5d] modulus: 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 public exponent: 10001 ] 2022-06-14 17:59:13.481 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 17:59:13.483 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 17:59:13.487 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:59:13.489 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:59:13.489 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:59:13.490 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 17:59:13.491 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 17:59:13.491 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 17:59:13.492 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 17:59:13.493 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 17:59:13.500 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 17:59:13.501 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:59:13.502 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 17:59:13.502 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:59:13.772 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 17:59:13.774 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 17:59:13.775 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 17:59:13.775 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:59:13.778 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 17:59:13.779 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 17:59:13.781 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:59:13.781 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:59:13.782 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:59:13.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:59:13.784 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:59:13.784 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:59:13.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:59:13.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:59:13.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:59:13.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:59:13.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:e7:83:a4:30:90:fe:ea:88:1a:5b:29:ea:cb:25:41:1f:c9:02:45] modulus: dfab2c553f9afb28e6078566f6a88a3da0e606871f7bfb162b2109cd4b11bad4f759e2ccb48396a58d4f4d143848381262c3ffe032cf37736a974c2e6209071781f0cccd99ebc1756e3aad765977e7f9b73e7958065a27f7f67e76850a7fc2a3080f99faadcb84c6037fe57ef22947b9c0e0e0b567f659d2290d3070415d73622b5bcb8e19a52b69087356adfbc521ff61a088f0de0cb639d8475a6d39bbf5dd78390c236b623c458ba4deb1e82c6c6e6cc4817e08dbfd74f38a90521be1c22666a39f8d743cb01e070a2f027e66708b09ac05e0c0ec2110de1a43c5ab61451cc7431d29fdd1a32cc7068a52f67d3dda91c6c6de4eb51c9ca265b1ea54179b55 public exponent: 10001 ] 2022-06-14 18:03:35.297 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:03:35.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:03:35.306 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:03:35.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:03:35.309 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:03:35.311 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:03:35.311 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:03:35.312 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:03:35.313 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:03:35.313 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:03:35.323 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:03:35.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:03:35.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:03:35.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:03:35.604 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:03:35.604 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:03:35.605 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:03:35.605 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:03:35.607 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:03:35.608 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:03:35.608 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:03:35.609 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:03:35.609 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:03:35.610 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:03:35.610 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:03:35.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:03:35.612 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:03:35.612 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:03:35.613 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:03:35.614 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:03:35.621 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:a6:38:f2:04:98:5f:83:d1:74:f7:d4:32:50:92:e2:8d:2a:e4:68] modulus: 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 public exponent: 10001 ] 2022-06-14 18:05:22.091 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:05:22.093 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:05:22.094 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:05:22.095 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:05:22.095 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:05:22.096 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:05:22.097 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:05:22.097 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:05:22.097 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:05:22.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:05:22.103 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:05:22.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:05:22.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:05:22.105 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:05:22.362 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:05:22.363 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:05:22.363 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:05:22.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:05:22.366 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:05:22.368 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:05:22.368 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:05:22.369 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:05:22.369 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:05:22.370 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:05:22.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:05:22.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:05:22.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:05:22.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:05:22.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:05:22.375 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:05:22.381 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:66:77:c9:e4:86:87:45:33:d7:0b:f9:df:9b:5c:e3:c6:af:e4:6b] modulus: 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 public exponent: 10001 ] 2022-06-14 18:08:31.323 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:08:31.327 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:08:31.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-14 18:08:31.338 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:08:31.339 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-14 18:08:31.340 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:08:31.340 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:08:31.341 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:08:31.341 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:08:31.342 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:08:31.351 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:08:31.352 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:08:31.352 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:08:31.353 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:08:31.585 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:08:31.586 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:08:31.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:08:31.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:08:31.589 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:08:31.589 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:08:31.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:08:31.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:08:31.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:08:31.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:08:31.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:08:31.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:08:31.594 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:08:31.595 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:08:31.595 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:08:31.596 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:08:31.602 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:6f:0c:92:f9:74:36:51:fa:a5:8d:1a:a1:3b:52:ba:03:6b:59:28] modulus: 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 public exponent: 10001 ] 2022-06-14 18:09:52.762 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:09:52.764 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:09:52.766 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:09:52.767 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:09:52.767 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:09:52.768 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:09:52.769 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:09:52.769 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:09:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:09:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:09:52.778 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:09:52.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:09:52.781 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:09:52.782 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:09:53.017 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:09:53.017 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:09:53.018 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:09:53.018 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:09:53.020 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:09:53.021 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:09:53.021 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:09:53.022 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:09:53.022 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:09:53.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:09:53.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:09:53.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:09:53.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:09:53.025 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:09:53.025 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:09:53.027 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:09:53.030 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: ad09265aca66d37242a2a880ecb916c3a7208824765971a86b17c2840a767744d5257d6e366769cc4674a4c53adb27137d99908e038e13f563efe8fbb5064d507ee0917af38cb1107593b45a7711a51f848f2d5f343f5938708b727d0ac4146a7f7a28b0546c01fdd930a15f1035d774a555494c50215fefb78d55fad8a567807a5ad00a59d94d28f67ce940b4ca5e35a5eee69262bcebefdc78c3d17244280e6334d0a21a48f6d6fa1903a436de0d4822e77316e9629ffcb63d6648d7147f58df5a9472e32c696e7786a038b5548275444ce987bbc947c338f6315d8bf663fea8b4910beb5a86dabf79f6e113a234a48570940ccb9cddbd1f4865f4b976fa7ac72774251532a0ce64aaa3c506a985bf2bf2c420ef77286146fdeafebce13b16c942ad860821a9db200aca095a1d82a1ef28d42acae6d5d3b4252768e82efc74eaf410c682e4b5dcaa3ffd02f0f178dd67eca568fcaa33fc5d061a309e9a80549f015d9d90c19e33242ca98f6c0ae899f34b15424e61187e1f097a2e86317883 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:6f:cf:e5:9c:ba:f2:90:3f:34:b1:ef:10:83:e0:3e:19:70:d2:6f] modulus: a77c80091ce1aaf160c7b0ce48032b5b461c5500a5c018baa83b5844bdf8eec2ebe5814a9d01e72d9e3af9b9f76f9f33d83b886d6ebc1f8c81b913208a5951ffca3246989848da09a9114e8a4164302b91098b9c5659c32e19ffacd5b6a24e091541a25ddc3d0025af45fd45e29bdd42b797cbb4aab2fcc2d3a8b70bbba7ecab0846762bd420f338436fa998e19cb4e09b84856052d177a44b72276e821dddb9992f9cb31c2d2dec9b4e55d07779c42e4f47286fab754c8e54bf544465dca7f74429bf95d7f19c9804e964730e5a6bd7226d5bf549db38d24748641387ff4350edf1d5cab51a24d12fb07d555a21710dde125b263396d12bc4fe8849658aec8d public exponent: 10001 ] 2022-06-14 18:13:36.603 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:13:36.606 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:13:36.610 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-14 18:13:36.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:13:36.613 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-14 18:13:36.614 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:13:36.615 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:13:36.616 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:13:36.616 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:13:36.616 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:13:36.624 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:13:36.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:13:36.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:13:36.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:13:36.843 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:13:36.844 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:13:36.844 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:13:36.844 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:13:36.846 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:13:36.846 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:13:36.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:13:36.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:13:36.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:13:36.848 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:13:36.848 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:13:36.849 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:13:36.849 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:13:36.850 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:13:36.850 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:13:36.852 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:13:36.856 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:38:3d:00:69:26:a2:31:a9:9d:ef:60:45:1f:d2:29:a5:a7:d6:55] modulus: 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 public exponent: 10001 ] 2022-06-14 18:14:05.582 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:14:05.584 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:14:05.586 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-14 18:14:05.587 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:14:05.588 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-14 18:14:05.588 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:14:05.589 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:14:05.589 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:14:05.590 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:14:05.590 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:14:05.598 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:14:05.599 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:14:05.599 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:14:05.600 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:05.871 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:14:05.872 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:14:05.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:14:05.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:05.875 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:14:05.875 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:14:05.876 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:05.876 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:05.877 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:05.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:05.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:05.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:05.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:05.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:05.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:05.881 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:14:05.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:71:95:47:26:99:c4:1f:07:01:ba:7a:5c:f0:5e:c1:a2:5b:75:46] modulus: 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 public exponent: 10001 ] 2022-06-14 18:14:13.393 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:14:13.394 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:14:13.396 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:14:13.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:14:13.397 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:14:13.398 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:14:13.399 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:14:13.399 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:14:13.400 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:14:13.400 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:14:13.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:14:13.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:14:13.409 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:14:13.409 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:13.658 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:14:13.659 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:14:13.660 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:14:13.660 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:13.662 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:14:13.662 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:14:13.663 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:13.663 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:13.663 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:13.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:13.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:13.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:13.666 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:13.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:13.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:13.669 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:14:13.674 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: ad09265aca66d37242a2a880ecb916c3a7208824765971a86b17c2840a767744d5257d6e366769cc4674a4c53adb27137d99908e038e13f563efe8fbb5064d507ee0917af38cb1107593b45a7711a51f848f2d5f343f5938708b727d0ac4146a7f7a28b0546c01fdd930a15f1035d774a555494c50215fefb78d55fad8a567807a5ad00a59d94d28f67ce940b4ca5e35a5eee69262bcebefdc78c3d17244280e6334d0a21a48f6d6fa1903a436de0d4822e77316e9629ffcb63d6648d7147f58df5a9472e32c696e7786a038b5548275444ce987bbc947c338f6315d8bf663fea8b4910beb5a86dabf79f6e113a234a48570940ccb9cddbd1f4865f4b976fa7ac72774251532a0ce64aaa3c506a985bf2bf2c420ef77286146fdeafebce13b16c942ad860821a9db200aca095a1d82a1ef28d42acae6d5d3b4252768e82efc74eaf410c682e4b5dcaa3ffd02f0f178dd67eca568fcaa33fc5d061a309e9a80549f015d9d90c19e33242ca98f6c0ae899f34b15424e61187e1f097a2e86317883 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:73:a5:3e:58:d2:19:16:c1:24:dd:c7:26:b4:f2:cb:d6:26:1d:cb] modulus: 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 public exponent: 10001 ] 2022-06-14 18:19:07.263 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:19:07.267 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:19:07.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:19:07.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:19:07.274 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:19:07.275 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:19:07.275 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:19:07.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:19:07.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:19:07.278 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:19:07.285 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:19:07.286 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:19:07.286 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:19:07.287 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:19:07.536 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:19:07.537 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:19:07.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:19:07.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:19:07.539 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:19:07.540 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:19:07.540 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:19:07.540 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:19:07.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:19:07.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:19:07.542 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:19:07.542 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:19:07.543 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:19:07.543 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:19:07.544 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:19:07.545 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:19:07.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:51:3b:45:f8:9c:41:59:b0:ff:e5:ad:f0:31:28:c0:eb:56:d0:45] modulus: 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 public exponent: 10001 ] 2022-06-14 18:23:59.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:23:59.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:23:59.426 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:23:59.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:23:59.428 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:23:59.429 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:23:59.429 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:23:59.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:23:59.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:23:59.431 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:23:59.438 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:23:59.439 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:23:59.440 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:23:59.440 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:23:59.695 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:23:59.696 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:23:59.696 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:23:59.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:23:59.699 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:23:59.699 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:23:59.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:23:59.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:23:59.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:23:59.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:23:59.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:23:59.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:23:59.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:23:59.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:23:59.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:23:59.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:23:59.712 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:32:51:1a:e4:4b:84:bd:d4:83:73:fb:34:22:c8:47:bc:8f:59:09] modulus: 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 public exponent: 10001 ] 2022-06-14 18:28:27.076 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:28:27.078 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:28:27.081 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:28:27.082 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:28:27.083 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:28:27.083 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:28:27.084 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:28:27.085 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:28:27.085 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:28:27.086 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:28:27.092 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:28:27.093 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:28:27.093 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:28:27.094 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:28:27.366 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:28:27.367 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:28:27.367 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:28:27.367 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:28:27.369 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:28:27.370 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:28:27.370 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:28:27.370 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:28:27.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:28:27.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:28:27.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:28:27.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:28:27.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:28:27.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:28:27.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:28:27.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:28:27.381 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:40:9f:f0:97:d6:a4:65:c2:f7:1c:21:c4:f2:98:c9:99:1b:f2:91] modulus: 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 public exponent: 10001 ] 2022-06-14 18:34:41.317 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-14 18:34:41.323 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-14 18:34:41.327 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:34:41.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:34:41.330 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:34:41.331 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-14 18:34:41.331 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-14 18:34:41.331 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-14 18:34:41.332 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-14 18:34:41.333 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-14 18:34:41.339 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-14 18:34:41.340 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:34:41.340 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-14 18:34:41.341 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:34:41.622 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-14 18:34:41.623 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-14 18:34:41.624 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-14 18:34:41.624 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:34:41.625 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-14 18:34:41.626 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-14 18:34:41.626 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:34:41.627 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:34:41.627 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:34:41.628 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:34:41.628 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:34:41.628 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:34:41.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:34:41.630 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:34:41.630 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:34:41.631 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:34:41.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: ad09265aca66d37242a2a880ecb916c3a7208824765971a86b17c2840a767744d5257d6e366769cc4674a4c53adb27137d99908e038e13f563efe8fbb5064d507ee0917af38cb1107593b45a7711a51f848f2d5f343f5938708b727d0ac4146a7f7a28b0546c01fdd930a15f1035d774a555494c50215fefb78d55fad8a567807a5ad00a59d94d28f67ce940b4ca5e35a5eee69262bcebefdc78c3d17244280e6334d0a21a48f6d6fa1903a436de0d4822e77316e9629ffcb63d6648d7147f58df5a9472e32c696e7786a038b5548275444ce987bbc947c338f6315d8bf663fea8b4910beb5a86dabf79f6e113a234a48570940ccb9cddbd1f4865f4b976fa7ac72774251532a0ce64aaa3c506a985bf2bf2c420ef77286146fdeafebce13b16c942ad860821a9db200aca095a1d82a1ef28d42acae6d5d3b4252768e82efc74eaf410c682e4b5dcaa3ffd02f0f178dd67eca568fcaa33fc5d061a309e9a80549f015d9d90c19e33242ca98f6c0ae899f34b15424e61187e1f097a2e86317883 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:16:01:44:b7:2d:b8:f0:d4:ca:01:60:6c:02:09:0e:21:b7:73:43] modulus: bd39e8665618e5258a0516b6d0ecc93c93d69bc62c0048f1446e27b27378e8c0a733c1e717cd639a7df51305a707bedbe990cf3227b11df623a30b694db9047ce9a223efbf7ccad0436ccd407419a34efacb8422113e62c3d854f80c7ad2d6bfef96bb7a6fcbef8ec81a7f9c8e29cb8af34cdb07a36fd1b779fff2cbee52b527255cb98c2e22e5bc1c224e3f870dae43ea290f5c63eef66d929306fcaa6861c6818e617f4211a7828d9b4e81490bde2db4d445a15f0f3229147fd83e53cfee8e98731bb7ec6104cd9379c05c479da201cc39c37a090c0d5021068047db80de4d314343c5bd546edc953a121fb2122f11762fb6b54e66316b9f7f3ca05c3f47d9 public exponent: 10001 ]