By type
2022-07-01 03:32:33,881 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-01 03:32:34,720 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-01 03:32:35.433 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jul 01, 2022 3:32:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 01, 2022 3:32:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 01, 2022 3:32:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 01, 2022 3:32:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-01 03:32:37.876 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-01 03:32:38.164 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-07-01 03:32:38.327 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-01 03:32:38.998 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-01 03:32:39.001 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-01 03:32:39.002 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-01 03:32:39.006 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-01 03:32:39.045 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-01 03:32:39.048 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-01 03:32:39.159 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-07-01 03:32:39.676 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 01, 2022 3:32:40 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-01 03:32:40.530 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.44 seconds (JVM running for 9.194) Jul 01, 2022 3:33:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-01 03:33:41.800 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 03:33:41.828 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 03:33:41.872 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-01 03:33:41.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 03:33:41.894 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-01 03:33:41.896 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 03:33:41.897 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 03:33:41.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 03:33:41.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 03:33:41.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 03:33:41.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 03:33:41.911 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 03:33:41.946 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 03:33:41.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 03:33:41.953 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 03:33:41.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 03:33:42.465 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 03:33:42.468 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 03:33:42.468 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 03:33:42.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 03:33:42.478 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 03:33:42.480 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 03:33:42.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 03:33:42.481 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 03:33:42.481 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 03:33:42.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 03:33:42.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 03:33:42.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 03:33:42.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 03:33:42.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 03:33:42.502 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 03:33:42.504 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 03:33:42.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:d8:36:40:12:25:50:ce:53:48:02:f3:ba:43:a3:6c:44:75:fa:a8] modulus: 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 public exponent: 10001 ] 2022-07-01 04:55:56.364 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 04:55:56.369 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 04:55:56.375 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 04:55:56.377 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 04:55:56.378 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 04:55:56.380 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 04:55:56.380 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 04:55:56.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 04:55:56.382 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 04:55:56.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 04:55:56.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 04:55:56.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 04:55:56.405 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 04:55:56.405 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 04:55:56.610 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 04:55:56.611 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 04:55:56.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 04:55:56.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 04:55:56.615 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 04:55:56.615 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 04:55:56.616 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:55:56.616 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:55:56.617 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:55:56.618 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:55:56.618 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:55:56.618 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:55:56.619 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:55:56.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:55:56.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:55:56.621 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 04:55:56.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:0f:9a:dc:4f:8e:76:a9:be:87:52:0a:ac:93:da:fc:d7:12:ef:4d] modulus: de4e6fc4a5c79ab191d4b89889a4924280c45a8cdb1c8e8946366abee7f7a6ae6913c9307eb5c83bc3405751acc03df2dc26bc2e900cfb34625d9d54fde184f77a88a4cc8797c9c78f7b28d1247f7a20fd314ea09c6c4fc5ad91b86c2fb78d00fea55cc26c357e1cb79cc4ac4680b5e969fd881c84fd33603c95493e12e0e22c3a92797e195c765301513ea30f59ad8680f57fdbb867e3621107d213ff0e3305d0e1d2f1431a222292535f8f99b26d3e8ae6dea33eea82bce0c89429a25c4c44435c8f09de9b2ef55da7a4f6b43a324ab49387623464b6d6c532e313e856be67859e7d59c4d4c7ceb380822b087eec6a1a71aa8e412918b28e5cffbb59e02b2d public exponent: 10001 ] 2022-07-01 04:57:58.398 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 04:57:58.401 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 04:57:58.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-01 04:57:58.405 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 04:57:58.406 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-01 04:57:58.407 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 04:57:58.407 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 04:57:58.408 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 04:57:58.409 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 04:57:58.409 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 04:57:58.417 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 04:57:58.418 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 04:57:58.418 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 04:57:58.418 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 04:57:58.553 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 04:57:58.554 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 04:57:58.554 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 04:57:58.555 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 04:57:58.558 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 04:57:58.558 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 04:57:58.559 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:57:58.560 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:57:58.560 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:57:58.562 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:57:58.563 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:57:58.564 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:57:58.565 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:57:58.565 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:57:58.566 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:57:58.567 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 04:57:58.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:c6:61:37:e7:d8:37:1e:0c:fc:48:06:dc:65:ae:f3:2d:2c:ea:22] modulus: 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 public exponent: 10001 ] 2022-07-01 04:59:14.385 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 04:59:14.386 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 04:59:14.388 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-01 04:59:14.389 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 04:59:14.389 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-01 04:59:14.390 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 04:59:14.391 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 04:59:14.391 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 04:59:14.391 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 04:59:14.392 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 04:59:14.397 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 04:59:14.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 04:59:14.399 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 04:59:14.399 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 04:59:14.567 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 04:59:14.568 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 04:59:14.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 04:59:14.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 04:59:14.570 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 04:59:14.570 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 04:59:14.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:59:14.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:59:14.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:59:14.573 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:59:14.573 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:59:14.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:59:14.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 04:59:14.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 04:59:14.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 04:59:14.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 04:59:14.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:2a:1c:10:6f:12:3f:eb:5a:9b:9a:d5:74:5b:8a:13:b5:39:cd:22] modulus: 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 public exponent: 10001 ] 2022-07-01 05:01:10.737 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:01:10.739 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:01:10.740 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:01:10.741 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:01:10.741 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:01:10.742 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:01:10.742 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:01:10.742 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:01:10.743 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:01:10.743 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:01:10.749 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:01:10.749 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:01:10.749 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:01:10.750 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:01:10.954 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:01:10.955 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:01:10.955 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:01:10.956 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:01:10.958 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:01:10.958 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:01:10.959 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:01:10.959 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:01:10.960 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:01:10.960 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:01:10.961 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:01:10.961 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:01:10.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:01:10.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:01:10.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:01:10.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:01:10.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:e9:e1:09:47:f1:40:0f:26:df:38:ae:22:44:86:f0:49:1b:00:68] modulus: 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 public exponent: 10001 ] 2022-07-01 05:05:08.131 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:05:08.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:05:08.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:05:08.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:05:08.137 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:05:08.138 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:05:08.139 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:05:08.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:05:08.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:05:08.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:05:08.147 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:05:08.148 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:05:08.148 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:05:08.148 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:05:08.328 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:05:08.329 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:05:08.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:05:08.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:05:08.333 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:05:08.333 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:05:08.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:05:08.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:05:08.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:05:08.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:05:08.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:05:08.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:05:08.339 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:05:08.340 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:05:08.341 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:05:08.343 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:05:08.348 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:a2:e0:e2:72:87:1e:73:40:a4:a2:e0:1d:3a:c6:72:2f:c1:d7:39] modulus: bd7e5cac516d7d0e7c03a07b30656cc96ccc21713af1d9d60592adbd2b27046ae403519b4ae295077e932bae284919e9d07e4857d29edc0908b216cb18f5c95ea3ff7bb77e834d73b38aa458d3019fb2f90b5fccae9cd6851cb4585e22bc2b9403ed44ebb21ad53d3ba6f17ed7aaa4967808153bb12d5ba189ccee511cee81163fcb5c3866f010873947630e36c0afbb8a06ec08c98941fc612773dee1cf765e6232e96747d014331d278a855444f52cf1ecf35a3eeec5da9296573797888d3d301502d1d3965f616ab4fab1ade6628290212e97c765b9ebdcfa206bfeaddcb7ffd749a3bf5caaeb6d4b7544fb8205106421a7c4a611fc51774da77f0707ff6d public exponent: 10001 ] 2022-07-01 05:08:58.270 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:08:58.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:08:58.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:08:58.275 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:08:58.275 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:08:58.276 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:08:58.277 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:08:58.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:08:58.278 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:08:58.279 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:08:58.286 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:08:58.287 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:08:58.288 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:08:58.288 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:08:58.426 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:08:58.427 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:08:58.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:08:58.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:08:58.429 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:08:58.430 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:08:58.430 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:08:58.430 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:08:58.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:08:58.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:08:58.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:08:58.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:08:58.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:08:58.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:08:58.434 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:08:58.436 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:08:58.442 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:7c:7e:c0:be:9f:ca:3c:09:41:a1:26:51:65:29:3e:52:bc:d5:e6] modulus: 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 public exponent: 10001 ] 2022-07-01 05:10:40.441 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:10:40.442 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:10:40.443 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:10:40.444 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:10:40.444 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:10:40.445 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:10:40.445 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:10:40.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:10:40.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:10:40.447 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:10:40.454 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:10:40.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:10:40.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:10:40.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:10:40.621 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:10:40.622 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:10:40.622 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:10:40.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:10:40.624 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:10:40.625 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:10:40.625 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:10:40.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:10:40.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:10:40.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:10:40.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:10:40.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:10:40.628 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:10:40.628 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:10:40.629 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:10:40.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:10:40.633 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:f2:9f:07:ac:8f:52:b5:79:b7:72:e6:36:9b:48:7c:15:da:e1:aa] modulus: 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 public exponent: 10001 ] 2022-07-01 05:14:30.504 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:14:30.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:14:30.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:14:30.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:14:30.511 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:14:30.512 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:14:30.512 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:14:30.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:14:30.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:14:30.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:14:30.519 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:14:30.520 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:14:30.520 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:14:30.520 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:14:30.701 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:14:30.702 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:14:30.702 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:14:30.703 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:14:30.704 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:14:30.705 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:14:30.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:14:30.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:14:30.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:14:30.707 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:14:30.708 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:14:30.708 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:14:30.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:14:30.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:14:30.711 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:14:30.712 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:14:30.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:fb:71:af:2f:f0:21:fa:44:57:1a:73:a3:aa:83:ab:78:5e:6b:5a] modulus: b772a6e8ad10969c3f4e57838058c4a493baa10be9578cf2c3facb3872cee16eb9cdd32db987443e78e9fb232850d5300c69d240003ccea29a569ab9c468057801e39560b08cc27b203bc2fb907b4a09001b3b7b4251b9ed454b2703b1706cbfa907eab979cceab4dec51673c82a6654ad1f4c971241557b4099f63dda189d358094d6b99989b45de776bde87782269eeaae9a22545d7b1f31f92e23aa9635bda223db791eac5038fc12f6cec0660f7f7925a2eaeda8ae40acce1553f298a834b02c7e35362c77d79b876b1cf832575f9a81f07bb51b825fc5000fe62f045abfbef6cd2734d80b5312bcc6ddef8a458c38e3245bf8d7dd5d2c9e5bc713e3e399 public exponent: 10001 ] 2022-07-01 05:16:26.270 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:16:26.271 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:16:26.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-01 05:16:26.274 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:16:26.274 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-01 05:16:26.275 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:16:26.275 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:16:26.276 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:16:26.276 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:16:26.277 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:16:26.282 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:16:26.283 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:16:26.284 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:16:26.284 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:16:26.421 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:16:26.422 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:16:26.422 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:16:26.423 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:16:26.425 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:16:26.425 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:16:26.426 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:16:26.426 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:16:26.427 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:16:26.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:16:26.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:16:26.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:16:26.429 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:16:26.430 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:16:26.430 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:16:26.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:16:26.434 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:66:20:c6:ec:19:f1:83:af:4f:7f:de:ea:6e:90:b4:05:e6:ab:da] modulus: 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 public exponent: 10001 ] 2022-07-01 05:18:35.449 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:18:35.450 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:18:35.452 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:18:35.453 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:18:35.453 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:18:35.454 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:18:35.455 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:18:35.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:18:35.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:18:35.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:18:35.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:18:35.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:18:35.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:18:35.465 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:18:35.698 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:18:35.699 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:18:35.699 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:18:35.699 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:18:35.701 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:18:35.701 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:18:35.701 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:18:35.702 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:18:35.702 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:18:35.702 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:18:35.703 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:18:35.703 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:18:35.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:18:35.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:18:35.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:18:35.705 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:18:35.709 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:ec:0f:15:a6:8a:29:a5:d2:ff:71:fe:d1:d0:87:a2:3c:d2:3c:db] modulus: b67775071fa73ef15d5bea55d5fd56ec47653679c5749e9ccb5e510c87e776c9cd4b8a5e5509684d3c84566bf6f3c16e75f88165de7a0769a950d687ae9d3f25e1d64a776e095c5aa714a876850003031e2620688d86f12d9bc6183c6b9508df8398d31b9c86f0c41ea0d41bbb0d8e1bb7f4767edf0e332c022fe64f9bae2517cd605ebea8d1df6fec0e7173e1ad9a8b28a5d2d1738edff81016ede092c85a458798f27a210d8b7f87c7107a6714850f93abb11ea12465801f295cd03b8f9642dd31864addaec70437af9f42229a39099b8074938c8fb73f86a6b9c642be41cd6311df0777e261b7fa9aef96883af144cd70ebfb4671216930408310cd1ff5eb public exponent: 10001 ] 2022-07-01 05:23:00.982 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:23:00.986 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:23:00.990 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-01 05:23:00.992 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:23:00.992 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-01 05:23:00.993 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:23:00.994 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:23:00.994 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:23:00.995 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:23:00.996 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:23:01.005 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:23:01.006 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:23:01.007 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:23:01.007 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:23:01.172 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:23:01.173 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:23:01.173 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:23:01.173 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:23:01.175 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:23:01.175 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:23:01.176 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:01.176 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:01.177 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:01.178 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:01.178 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:01.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:01.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:01.180 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:01.180 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:01.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:23:01.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:6e:58:23:94:24:11:6b:87:fa:7c:51:c9:3d:bf:b3:1d:c3:8f:cc] modulus: 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 public exponent: 10001 ] 2022-07-01 05:23:21.984 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:23:21.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:23:21.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:23:21.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:23:21.990 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:23:21.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:23:21.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:23:21.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:23:21.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:23:21.994 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:23:21.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:23:22.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:23:22.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:23:22.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:23:22.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:23:22.169 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:23:22.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:23:22.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:23:22.172 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:23:22.173 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:23:22.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:22.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:22.174 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:22.175 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:22.175 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:22.175 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:22.176 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:22.177 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:22.177 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:22.178 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:23:22.182 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:6a:d6:c0:14:37:f9:52:b7:a3:98:47:88:e0:96:09:33:13:95:fb] modulus: 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 public exponent: 10001 ] 2022-07-01 05:23:26.832 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:23:26.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:23:26.836 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-01 05:23:26.837 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:23:26.838 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-01 05:23:26.839 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:23:26.839 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:23:26.840 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:23:26.840 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:23:26.841 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:23:26.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:23:26.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:23:26.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:23:26.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:23:26.975 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:23:26.976 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:23:26.976 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:23:26.977 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:23:26.978 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:23:26.978 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:23:26.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:26.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:26.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:26.981 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:26.981 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:26.982 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:26.983 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:23:26.983 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:23:26.984 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:23:26.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:23:26.989 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:d0:95:18:2c:81:d1:15:93:fb:dd:ef:18:15:4a:a3:c2:42:3f:76] modulus: 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 public exponent: 10001 ] 2022-07-01 05:27:12.620 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:27:12.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:27:12.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:27:12.624 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:27:12.624 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:27:12.625 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:27:12.625 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:27:12.626 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:27:12.626 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:27:12.626 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:27:12.631 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:27:12.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:27:12.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:27:12.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:27:12.842 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:27:12.842 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:27:12.843 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:27:12.843 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:27:12.845 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:27:12.845 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:27:12.845 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:27:12.846 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:27:12.846 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:27:12.847 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:27:12.847 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:27:12.847 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:27:12.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:27:12.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:27:12.849 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:27:12.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:27:12.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:59:17:26:0c:9d:a3:f1:e3:ce:62:f7:88:09:95:68:28:21:d3:1e] modulus: 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 public exponent: 10001 ] 2022-07-01 05:31:55.668 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:31:55.671 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:31:55.673 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:31:55.674 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:31:55.675 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:31:55.675 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:31:55.676 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:31:55.676 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:31:55.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:31:55.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:31:55.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:31:55.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:31:55.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:31:55.684 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:31:55.924 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:31:55.924 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:31:55.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:31:55.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:31:55.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:31:55.927 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:31:55.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:31:55.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:31:55.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:31:55.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:31:55.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:31:55.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:31:55.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:31:55.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:31:55.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:31:55.931 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:31:55.936 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:02:ef:af:d4:a4:95:bc:79:f4:f2:73:9d:d2:0c:41:11:be:10:f5] modulus: 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 public exponent: 10001 ] 2022-07-01 05:35:57.910 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:35:57.912 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:35:57.914 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:35:57.915 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:35:57.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:35:57.916 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:35:57.917 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:35:57.917 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:35:57.917 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:35:57.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:35:57.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:35:57.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:35:57.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:35:57.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:35:58.110 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:35:58.111 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:35:58.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:35:58.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:35:58.113 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:35:58.113 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:35:58.114 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:35:58.114 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:35:58.114 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:35:58.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:35:58.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:35:58.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:35:58.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:35:58.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:35:58.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:35:58.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:35:58.121 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:bd:b5:5f:0f:b0:1a:b8:38:6f:05:2a:fd:e3:46:6f:ef:a2:b7:98] modulus: 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 public exponent: 10001 ] 2022-07-01 05:39:52.122 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:39:52.124 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:39:52.126 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:39:52.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:39:52.127 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:39:52.128 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:39:52.128 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:39:52.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:39:52.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:39:52.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:39:52.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:39:52.135 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:39:52.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:39:52.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:39:52.334 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:39:52.335 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:39:52.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:39:52.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:39:52.337 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:39:52.337 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:39:52.337 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:39:52.337 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:39:52.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:39:52.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:39:52.339 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:39:52.339 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:39:52.340 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:39:52.340 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:39:52.340 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:39:52.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:39:52.344 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 9d1981984c258f88478a2e9c6652e2977d5fa8218b3f38d06e524bd9b1cfde507bb01ae8699e56f5864eeee5baf64be4dae7d8427c70567bfcf319710971fae4155b7418dcc18405263e5de300deac40612f6f4f086c34293ed733d4ed3685dae0c01bead9b0179afe40e61ad1672efa7b71e9ea00d309f09000f051ad536873ead70ab91aa97772f7be8af418c24c25c6087a4392e9abb4d46c422c79255425d36deabe702f8c7e0aced090be44b66865429dbeaf0b73d7f511928e1cc7ff1ba3c101a1da2b2ecf31b9a643b011feb4a4f1aa925db42942aa00bcbac22623e4f3e9dde03835bbf2d9f216a8433b582df1eef549581a812c5f76c8785ac966a53a6aa0b26da7219ed746d96115b471d6108475ca19a3f250ae57d31eb014e9060c323739e3d1173caa1cd683f487e5df2667ba02adda3f707ccc9971d11e6cd50fb646f06d2d725397afb3a6f2ee1ba0af7fd9345455b8604fbd3e22006ded99a788866f4d01726ba22e446ad7266328af4636f646ffb771fbe7f4b7d4ee2b3b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:4f:d7:24:60:a9:50:e0:3f:ac:59:85:9e:47:92:05:5f:22:5a:8b] modulus: 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 public exponent: 10001 ] 2022-07-01 05:44:40.756 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-01 05:44:40.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-01 05:44:40.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:44:40.761 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-01 05:44:40.761 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-01 05:44:40.763 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-01 05:44:40.763 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-01 05:44:40.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-01 05:44:40.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-01 05:44:40.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-01 05:44:40.769 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-01 05:44:40.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:44:40.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-01 05:44:40.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:44:40.948 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-01 05:44:40.948 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-01 05:44:40.949 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-01 05:44:40.949 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-01 05:44:40.951 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-01 05:44:40.951 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-01 05:44:40.951 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:44:40.951 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:44:40.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:44:40.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:44:40.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:44:40.953 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:44:40.953 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-01 05:44:40.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-01 05:44:40.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-01 05:44:40.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-01 05:44:40.957 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 343366063067050649103981516106384914668502216658 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 01 03:30:24 UTC 2022 Final Date: Wed Jun 30 03:30:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [74:1e:71:d0:5b:20:97:2d:0e:da:6c:e2:f9:65:12:e5:c2:03:93:a1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 590213e41d7a648faf41c42fa3c77aa1f0d7b2cf 1d57c3fb96dc78dd469083289a0d5334307357c6 9ba470cb1d06677354bbfdb10a7b328f46246577 2d349cc65766358c1186f7f056e58ae9405e754e d522d3a003ba04280584fc223f3b8d7161e1c1bc 9141e6bd18d9992c8075664eaf51acec02f0e1d6 bf8bb8eae872f21e5401b366a08ca1da40be5447 40e5e6720658d0832d583d04ce832f255a3474e7 aea9d70371b9e8b891d4cc3bef4947eb4d1e130e 75de045f6a6bd396a0f9ab4482852493f168d787 636257b4c1b302136e15d32a1716eccfc2b92f1d b299f76a254df30a2287d369229ad85a81d289d8 fc2777f1842ad5f9b18405e821f1a3d9bb024fe8 b75d92b6743e4b420abd1fb20dad6e80028761bd dc8ae4df24df34698067a694d7b518613f0b1a8e 89365640d86794edc502795e4411be9a21f08ba6 a919de224e863433be48ba85e54a1a4200e56114 8e2a0ad6fa8a62fd16bbeed5142880c4f97474f8 4869f7e1f429b96c7e034d972e56b90d3e2c53d7 e5acfc8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:3e:93:40:56:09:93:35:d2:1b:4e:f6:9b:c7:4f:f2:71:a6:19:d6] modulus: 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 public exponent: 10001 ]