By type
2022-06-20 03:14:10,191 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-20 03:14:11,053 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-20 03:14:11.755 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 20, 2022 3:14:13 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 20, 2022 3:14:13 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 20, 2022 3:14:13 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 20, 2022 3:14:13 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-20 03:14:14.062 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-20 03:14:14.356 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-20 03:14:14.518 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-20 03:14:15.200 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-20 03:14:15.203 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-20 03:14:15.205 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-20 03:14:15.208 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-20 03:14:15.246 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-20 03:14:15.250 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-20 03:14:15.376 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-20 03:14:16.013 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 20, 2022 3:14:16 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-20 03:14:16.879 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.505 seconds (JVM running for 9.169) Jun 20, 2022 3:14:40 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-20 03:14:54.179 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 03:14:54.186 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 03:14:54.221 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-20 03:14:54.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 03:14:54.240 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-20 03:14:54.243 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 03:14:54.244 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 03:14:54.245 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 03:14:54.245 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 03:14:54.249 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 03:14:54.256 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 03:14:54.260 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 03:14:54.305 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 03:14:54.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 03:14:54.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 03:14:54.314 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 03:14:54.977 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 03:14:54.981 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 03:14:54.982 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 03:14:54.984 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 03:14:54.996 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 03:14:54.997 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 03:14:54.998 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 03:14:54.999 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 03:14:55.000 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 03:14:55.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 03:14:55.013 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 03:14:55.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 03:14:55.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 03:14:55.023 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 03:14:55.023 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 03:14:55.026 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 03:14:55.060 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: c95af30004bb77eac4b354abc447fd994185e0a5591ca3ff182923ed1f49195c04948772afb4df8e744a5136d62f8e64f3c7b31d17cc38e72d90cc96cc6ec3b59b0ee6ae5f8e57f5a0fe50b2f3225689817800d870b190b9bf8874f870814e543ca6e27615f3f15e5058eeb960fa0f0e8568023d6dbffe4fcc00b0311afa88df7a9a5d9afd78083aa93d2b75917d0224742ef04c5b78f33f2c0ed6a0826f8e1c40dda7d9ab13fd046a196240ce89d1776955ec3f7a8af4497326269aead52eb57199d0203ed059b4fdf7c18414500377fe988bbbcf1833129a5f8fb363487386b65880b2c8d921fffed30ddf41e962e8dd1cbfc71b4a0d8de83b18cf01519415fb99125eee02c8cf95e91b43ed589476750abbdb136bfa20d6762a955dd8808107cd02370329b283d85a975dc11825a7c7b0b9d11aa176e3d340abc39e1d60a8f3ef1e957e952c703c5693914a1a1b15f532ad4c20a081c7065c60700cff96179db408d6d03459b01b68957abf2750bbaa7df8d696178971b9ef28df96b4ed29 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:82:39:82:f4:ca:30:99:0f:03:68:e7:54:39:55:f7:ad:db:23:47] modulus: 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 public exponent: 10001 ] 2022-06-20 04:34:21.711 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:34:21.714 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:34:21.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:34:21.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:34:21.718 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:34:21.719 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:34:21.720 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:34:21.720 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:34:21.721 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:34:21.721 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:34:21.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:34:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:34:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:34:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:34:21.929 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:34:21.931 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:34:21.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:34:21.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:34:21.934 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:34:21.935 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:34:21.935 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:34:21.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:34:21.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:34:21.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:34:21.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:34:21.938 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:34:21.939 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:34:21.939 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:34:21.939 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:34:21.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:34:21.945 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:c9:b8:36:41:b0:c3:14:61:66:d6:38:17:c8:86:24:11:af:81:4b] modulus: c2161d2f836bd51efba5ee87a402efe0c4ae11a9c133c0a1be8c69d2a8013889670867a4caf586d30cbea4915b7675cdda7ea233e6cbb15bdac51c49d69a1dbcdb6829ba18178f1a898ec44d42c674fbd0b54b5800da32773de3aaed16ae3323c6a2f703d64e86a897f4d38f36f2b8e9209935c6be1888f4525f596e47b7dc0c545a8c6fe271d624efba0818142996cd5b3b64d73799311704c29a62c993ec04c471ce7a17eef345c692f01d1921081b9fcdf442750b761bbbc7587a2593fe5859a80084ca750863c4ca2a454ca05389fba713517d8c1db648324e5715a0e2d8140eb86afe106fd4687860682b488527c7268d957675d722c6aab41c56d08281 public exponent: 10001 ] 2022-06-20 04:36:07.872 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:36:07.875 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:36:07.878 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-20 04:36:07.879 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:36:07.880 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-20 04:36:07.881 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:36:07.882 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:36:07.882 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:36:07.883 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:36:07.886 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:36:07.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:36:07.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:36:07.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:36:07.897 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:36:08.106 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:36:08.107 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:36:08.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:36:08.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:36:08.110 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:36:08.111 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:36:08.111 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:36:08.112 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:36:08.112 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:36:08.114 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:36:08.114 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:36:08.114 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:36:08.115 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:36:08.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:36:08.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:36:08.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:36:08.121 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:76:64:3e:ab:a0:c2:a4:de:51:7e:ca:68:14:40:a3:95:73:4b:3d] modulus: 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 public exponent: 10001 ] 2022-06-20 04:37:40.161 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:37:40.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:37:40.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-20 04:37:40.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:37:40.165 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-20 04:37:40.166 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:37:40.166 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:37:40.167 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:37:40.167 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:37:40.168 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:37:40.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:37:40.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:37:40.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:37:40.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:37:40.344 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:37:40.345 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:37:40.345 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:37:40.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:37:40.348 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:37:40.349 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:37:40.350 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:37:40.350 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:37:40.351 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:37:40.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:37:40.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:37:40.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:37:40.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:37:40.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:37:40.355 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:37:40.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:37:40.362 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:2c:a6:4b:4e:aa:85:3a:8a:d9:ee:d6:c1:04:33:41:eb:16:e9:25] modulus: f91871e3903cd2ca51156f839da31d0b890e4747b4043dd7889a70cfacf4f5535d7727b363218f31247674b86dfea3edbc81c1a2f640ebea329562cb788c14f03e21b94aa4eba45f8f13b5c41e4fd1e5a7ee9c7e25a316a54520a75518ea317f2b86a820935068610f85c402fbb4529017e3f2b7f336f08f66fc2c79dcfc778f379c2f8ab834fe57ee7929a0ca70ab7aec470c279cb07750b993b8da804e9863916d1579c6c1fe09f14cf1daee055b15c6e999fe247f601cce05f44d29a919ead62d6feb74fc5b0361e1d3f640e94c1fe71fad6d3b99e6aa6355db98557dd70c40dca4009ef22097bf9c05b35b7c5453f26ba285d1e80b7d5739fbd43605fd85 public exponent: 10001 ] 2022-06-20 04:39:40.096 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:39:40.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:39:40.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:39:40.101 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:39:40.102 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:39:40.102 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:39:40.103 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:39:40.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:39:40.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:39:40.105 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:39:40.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:39:40.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:39:40.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:39:40.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:39:40.300 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:39:40.301 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:39:40.302 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:39:40.302 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:39:40.304 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:39:40.305 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:39:40.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:39:40.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:39:40.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:39:40.307 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:39:40.307 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:39:40.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:39:40.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:39:40.309 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:39:40.309 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:39:40.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:39:40.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:3f:43:34:0d:3b:67:16:ca:01:19:06:93:c4:99:bb:11:17:5f:b3] modulus: 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 public exponent: 10001 ] 2022-06-20 04:43:38.196 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:43:38.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:43:38.201 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:43:38.204 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:43:38.204 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:43:38.205 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:43:38.206 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:43:38.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:43:38.207 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:43:38.207 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:43:38.215 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:43:38.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:43:38.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:43:38.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:43:38.549 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:43:38.549 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:43:38.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:43:38.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:43:38.556 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:43:38.557 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:43:38.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:43:38.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:43:38.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:43:38.563 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:43:38.564 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:43:38.565 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:43:38.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:43:38.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:43:38.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:43:38.567 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:43:38.573 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:88:cf:7f:3e:f8:6a:0e:14:08:2b:4c:b0:d9:89:68:13:88:b9:be] modulus: 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 public exponent: 10001 ] 2022-06-20 04:47:50.724 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:47:50.725 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:47:50.727 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:47:50.728 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:47:50.728 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:47:50.729 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:47:50.730 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:47:50.730 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:47:50.731 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:47:50.731 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:47:50.736 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:47:50.736 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:47:50.737 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:47:50.737 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:47:50.923 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:47:50.924 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:47:50.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:47:50.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:47:50.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:47:50.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:47:50.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:47:50.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:47:50.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:47:50.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:47:50.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:47:50.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:47:50.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:47:50.931 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:47:50.931 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:47:50.932 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:47:50.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0e:c5:4f:72:fd:48:c5:df:9d:b8:1c:a5:2b:26:ce:5f:16:da:4c:e1] modulus: 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 public exponent: 10001 ] 2022-06-20 04:51:41.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:51:41.812 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:51:41.817 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-20 04:51:41.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:51:41.820 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-20 04:51:41.821 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:51:41.821 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:51:41.822 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:51:41.823 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:51:41.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:51:41.829 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:51:41.831 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:51:41.831 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:51:41.831 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:51:42.079 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:51:42.079 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:51:42.080 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:51:42.080 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:51:42.081 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:51:42.082 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:51:42.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:51:42.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:51:42.083 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:51:42.084 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:51:42.085 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:51:42.085 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:51:42.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:51:42.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:51:42.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:51:42.087 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:51:42.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: c95af30004bb77eac4b354abc447fd994185e0a5591ca3ff182923ed1f49195c04948772afb4df8e744a5136d62f8e64f3c7b31d17cc38e72d90cc96cc6ec3b59b0ee6ae5f8e57f5a0fe50b2f3225689817800d870b190b9bf8874f870814e543ca6e27615f3f15e5058eeb960fa0f0e8568023d6dbffe4fcc00b0311afa88df7a9a5d9afd78083aa93d2b75917d0224742ef04c5b78f33f2c0ed6a0826f8e1c40dda7d9ab13fd046a196240ce89d1776955ec3f7a8af4497326269aead52eb57199d0203ed059b4fdf7c18414500377fe988bbbcf1833129a5f8fb363487386b65880b2c8d921fffed30ddf41e962e8dd1cbfc71b4a0d8de83b18cf01519415fb99125eee02c8cf95e91b43ed589476750abbdb136bfa20d6762a955dd8808107cd02370329b283d85a975dc11825a7c7b0b9d11aa176e3d340abc39e1d60a8f3ef1e957e952c703c5693914a1a1b15f532ad4c20a081c7065c60700cff96179db408d6d03459b01b68957abf2750bbaa7df8d696178971b9ef28df96b4ed29 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:33:dc:12:e0:5c:cd:5e:1f:6e:b4:e4:e9:a0:82:65:3c:ed:22:7e] modulus: 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 public exponent: 10001 ] 2022-06-20 04:52:16.908 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:52:16.909 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:52:16.910 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:52:16.911 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:52:16.911 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:52:16.912 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:52:16.912 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:52:16.912 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:52:16.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:52:16.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:52:16.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:52:16.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:52:16.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:52:16.919 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:52:17.264 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:52:17.264 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:52:17.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:52:17.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:52:17.267 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:52:17.267 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:52:17.267 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:52:17.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:52:17.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:52:17.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:52:17.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:52:17.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:52:17.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:52:17.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:52:17.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:52:17.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:52:17.275 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:61:22:fa:ad:e0:e4:96:73:50:28:48:fd:ee:29:fe:99:6c:67:5f] modulus: b18d8a40ffb55788c3e85ddec050bab3a7d6a3d99de0ce97bff7c0f2b7b76d866d061d45450a9d54b2da5c3283d7349047a530d7453e86cc705afa7803aedad799cda7bb0e5b2f93cf6c1424df83d9eec5e991c5f89d89f1b7e56867b9173a5721ad5d8be9df4da7cdb177b26432c8fedbc045c2544bc51fcdfd16b7fbf253f9df47a200b41ce4c6c7338cd67fc0eee7f972772f12e78aba56af5bd1167cba70d14aa0390eef3506ad9b93b3aaba3e2247827c8cbadd8708b2b5563bd6e5343f1cf39408a16aa049e90f537fbd124a06141777b5457381fe6986709534af28a97942e36221f8b6410657d7bd11ed0b87174f9f5b302bdd636bf6b69b543d5677 public exponent: 10001 ] 2022-06-20 04:59:10.840 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:59:10.844 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:59:10.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-20 04:59:10.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:59:10.849 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-20 04:59:10.850 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:59:10.850 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:59:10.851 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:59:10.851 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:59:10.852 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:59:10.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:59:10.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:59:10.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:59:10.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:59:11.097 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:59:11.097 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:59:11.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:59:11.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:59:11.099 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:59:11.100 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:59:11.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:59:11.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:59:11.101 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:59:11.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:59:11.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:59:11.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:59:11.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:59:11.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:59:11.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:59:11.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:59:11.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:e0:cc:11:f1:17:b0:cf:49:0d:30:46:75:7e:88:de:91:1c:d1:06] modulus: 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 public exponent: 10001 ] 2022-06-20 04:59:25.918 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-20 04:59:25.919 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-20 04:59:25.920 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-20 04:59:25.920 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:59:25.921 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-20 04:59:25.921 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-20 04:59:25.921 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-20 04:59:25.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-20 04:59:25.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-20 04:59:25.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-20 04:59:25.927 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-20 04:59:25.927 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:59:25.927 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-20 04:59:25.928 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:59:26.090 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-20 04:59:26.091 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-20 04:59:26.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-20 04:59:26.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:59:26.093 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-20 04:59:26.094 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-20 04:59:26.094 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:59:26.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:59:26.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:59:26.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:59:26.096 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:59:26.096 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:59:26.097 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:59:26.097 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:59:26.097 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:59:26.099 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:59:26.103 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365815511174479652035312205163246065271398051337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 03:10:57 UTC 2022 Final Date: Sat Jun 19 03:10:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [49:5f:da:56:21:da:0f:cd:be:d2:d0:34:b2:df:ef:87:1b:45:69:cd] modulus: c95af30004bb77eac4b354abc447fd994185e0a5591ca3ff182923ed1f49195c04948772afb4df8e744a5136d62f8e64f3c7b31d17cc38e72d90cc96cc6ec3b59b0ee6ae5f8e57f5a0fe50b2f3225689817800d870b190b9bf8874f870814e543ca6e27615f3f15e5058eeb960fa0f0e8568023d6dbffe4fcc00b0311afa88df7a9a5d9afd78083aa93d2b75917d0224742ef04c5b78f33f2c0ed6a0826f8e1c40dda7d9ab13fd046a196240ce89d1776955ec3f7a8af4497326269aead52eb57199d0203ed059b4fdf7c18414500377fe988bbbcf1833129a5f8fb363487386b65880b2c8d921fffed30ddf41e962e8dd1cbfc71b4a0d8de83b18cf01519415fb99125eee02c8cf95e91b43ed589476750abbdb136bfa20d6762a955dd8808107cd02370329b283d85a975dc11825a7c7b0b9d11aa176e3d340abc39e1d60a8f3ef1e957e952c703c5693914a1a1b15f532ad4c20a081c7065c60700cff96179db408d6d03459b01b68957abf2750bbaa7df8d696178971b9ef28df96b4ed29 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4af470e913403d30e0d6415359708ca6bccd8b0f d9f53e1bf5c737718a8d539f4e0915fc0223c208 6515ec610da1ea6f9812e037c18017f407b21785 096e04f369b246a5fae12de0f962294d60e17ff7 f5deb3ee2afa8f345ac027918a9ac5cfdc3b6c53 a3aa735ad10264a2fdb0176b34a7360bfd9a38b8 d1d0fa5cb34312a487e841d1864562b44df15b4c f027c79d7e7e82f5cdc8cca659da7e33846cebe9 58fe4cf0d38be1daa6bf33cac9a27b6e5013efcf 5576b8ddc76b8b8b5611412f48b5f81fbb6ebdd0 db38d94f6d687dd4767b55b6135411553e5f6a88 43354c2c251d4583e4f72a960ac463ed33c1070e 3e21f1d12f6006e10114b0118dde388daaf5b6f6 53ea6182482955056f0a2ac6da21c100c9b2cd53 3e974a56554a50053f67504012b60015cac01b9e 3f1a204c4158e4c6b511a525b6453ad9bea52e7a ee3c1b3cf4ca31fd642b602ef3e631517f89c900 57ccb63523ff8dbd4d64b9c1df0e362e5d163612 c625feba0fe924f21cd440e588735ba058900788 d5d73ef2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:5e:ae:9a:29:d4:40:b5:12:e3:e4:7a:76:9d:05:31:45:e2:9f:d7] modulus: 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 public exponent: 10001 ]