By type
2022-07-04 03:21:08,663 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-04 03:21:09,488 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-04 03:21:10.235 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jul 04, 2022 3:21:11 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 04, 2022 3:21:11 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 04, 2022 3:21:11 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 04, 2022 3:21:12 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-04 03:21:12.521 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-04 03:21:12.800 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-07-04 03:21:12.962 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-04 03:21:13.620 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-04 03:21:13.624 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-04 03:21:13.626 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-04 03:21:13.630 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-04 03:21:13.671 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-04 03:21:13.674 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-04 03:21:13.791 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-07-04 03:21:14.317 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 04, 2022 3:21:14 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-04 03:21:15.238 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.323 seconds (JVM running for 9.041) Jul 04, 2022 3:21:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-04 03:22:11.674 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 03:22:11.682 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 03:22:11.721 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-04 03:22:11.724 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 03:22:11.739 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-04 03:22:11.741 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 03:22:11.742 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 03:22:11.744 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 03:22:11.744 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 03:22:11.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 03:22:11.754 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 03:22:11.757 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 03:22:11.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 03:22:11.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 03:22:11.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 03:22:11.806 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 03:22:12.328 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 03:22:12.331 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 03:22:12.332 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 03:22:12.333 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 03:22:12.344 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 03:22:12.346 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 03:22:12.348 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 03:22:12.348 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 03:22:12.349 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 03:22:12.360 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 03:22:12.361 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 03:22:12.362 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 03:22:12.367 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 03:22:12.368 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 03:22:12.368 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 03:22:12.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 03:22:12.399 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:11:bc:0d:9f:b7:25:aa:de:41:1f:1b:18:ee:52:d1:c4:01:74:16] modulus: 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 public exponent: 10001 ] 2022-07-04 04:50:52.109 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 04:50:52.112 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 04:50:52.115 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 04:50:52.117 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 04:50:52.117 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 04:50:52.118 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 04:50:52.119 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 04:50:52.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 04:50:52.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 04:50:52.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 04:50:52.132 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 04:50:52.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:50:52.134 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:50:52.134 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:50:52.319 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 04:50:52.321 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 04:50:52.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 04:50:52.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:50:52.325 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 04:50:52.326 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 04:50:52.326 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:50:52.327 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:50:52.327 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:50:52.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:50:52.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:50:52.330 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:50:52.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:50:52.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:50:52.332 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:50:52.333 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 04:50:52.338 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:f3:e3:f9:32:2c:88:04:3b:ed:c2:10:a2:7b:4b:19:dd:cb:bf:0c] modulus: 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 public exponent: 10001 ] 2022-07-04 04:52:40.074 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 04:52:40.076 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 04:52:40.079 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-04 04:52:40.081 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 04:52:40.081 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-04 04:52:40.082 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 04:52:40.083 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 04:52:40.084 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 04:52:40.084 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 04:52:40.085 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 04:52:40.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 04:52:40.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:52:40.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:52:40.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:52:40.219 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 04:52:40.219 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 04:52:40.220 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 04:52:40.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:52:40.223 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 04:52:40.223 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 04:52:40.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:52:40.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:52:40.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:52:40.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:52:40.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:52:40.228 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:52:40.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:52:40.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:52:40.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:52:40.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 04:52:40.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:3d:04:08:28:f0:bd:48:92:30:d6:6a:bb:59:95:c5:36:92:c7:5d] modulus: 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 public exponent: 10001 ] 2022-07-04 04:53:52.040 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 04:53:52.041 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 04:53:52.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-04 04:53:52.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 04:53:52.051 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-04 04:53:52.053 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 04:53:52.054 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 04:53:52.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 04:53:52.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 04:53:52.057 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 04:53:52.061 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 04:53:52.063 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:53:52.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:53:52.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:53:52.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 04:53:52.215 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 04:53:52.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 04:53:52.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:53:52.218 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 04:53:52.218 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 04:53:52.222 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:53:52.222 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:53:52.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:53:52.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:53:52.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:53:52.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:53:52.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:53:52.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:53:52.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:53:52.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 04:53:52.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: b9e9f4ff9e6e150aedf6173f7ee5404b954b626d3baa35ab40d99bccf45ef2b2181225c1773bd829071043e9b7e3ab155d8c646b27c2f389d3d94417343586b89cad15ca222b69c239ed56cd8c6caccc807ce605b8476af5f35b72602c909228b28d6607909569e41e005efea8c3ec47ce3a7a5a909e97b223df20cddc4a37f6b2516afb1c41b6f5dcd4f5bf39e41b0624b69fed3b10464e919f3ed23791219866b90c5dbf05bc48737f36b5e7ffd5f7b530aec53e0a5a0777ad49547ac5548b7e9d518c040f0750dd2c30b5280a3f4fe689079cba2906ec3c7b110ac9500c41efce67a4c53a486763de7e4a17aadc44dd780a3e1ef4d4e98b547e215a1d63e224e66db929c87e2fa92d0802f8edacf85d0255e439577c541e2fae7af499a2fb7bb1b5f1a392f7472d4d0743daeac22a795d36c1a265573310067b137415ae2e2eee29ab35f0a5621bba908f89095479f918d55e7caf0ba5b0e4b69e6654787bb9ce3800cf5c9d6a93aba40ea42ff95cfd8760226f8290971b2baab7d6078863 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:7b:44:54:c0:50:61:4a:67:d7:91:35:a0:2c:84:bc:b4:a8:d0:ce] modulus: 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 public exponent: 10001 ] 2022-07-04 04:56:31.539 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 04:56:31.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 04:56:31.542 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 04:56:31.543 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 04:56:31.544 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 04:56:31.545 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 04:56:31.545 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 04:56:31.545 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 04:56:31.546 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 04:56:31.546 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 04:56:31.551 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 04:56:31.551 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:56:31.552 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:56:31.552 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:56:31.751 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 04:56:31.752 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 04:56:31.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 04:56:31.753 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:56:31.755 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 04:56:31.756 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 04:56:31.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:56:31.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:56:31.757 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:56:31.757 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:56:31.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:56:31.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:56:31.759 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:56:31.759 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:56:31.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:56:31.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 04:56:31.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:2b:e5:43:16:95:37:97:3b:1b:0f:dd:97:93:1b:8b:cc:34:9c:e3] modulus: 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 public exponent: 10001 ] 2022-07-04 04:59:43.680 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 04:59:43.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 04:59:43.684 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 04:59:43.684 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 04:59:43.685 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 04:59:43.685 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 04:59:43.685 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 04:59:43.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 04:59:43.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 04:59:43.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 04:59:43.692 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 04:59:43.692 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:59:43.693 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 04:59:43.693 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:59:43.868 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 04:59:43.869 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 04:59:43.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 04:59:43.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 04:59:43.871 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 04:59:43.872 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 04:59:43.872 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:59:43.873 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:59:43.873 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:59:43.873 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:59:43.874 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:59:43.874 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:59:43.875 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 04:59:43.875 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 04:59:43.875 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 04:59:43.876 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 04:59:43.879 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: b9e9f4ff9e6e150aedf6173f7ee5404b954b626d3baa35ab40d99bccf45ef2b2181225c1773bd829071043e9b7e3ab155d8c646b27c2f389d3d94417343586b89cad15ca222b69c239ed56cd8c6caccc807ce605b8476af5f35b72602c909228b28d6607909569e41e005efea8c3ec47ce3a7a5a909e97b223df20cddc4a37f6b2516afb1c41b6f5dcd4f5bf39e41b0624b69fed3b10464e919f3ed23791219866b90c5dbf05bc48737f36b5e7ffd5f7b530aec53e0a5a0777ad49547ac5548b7e9d518c040f0750dd2c30b5280a3f4fe689079cba2906ec3c7b110ac9500c41efce67a4c53a486763de7e4a17aadc44dd780a3e1ef4d4e98b547e215a1d63e224e66db929c87e2fa92d0802f8edacf85d0255e439577c541e2fae7af499a2fb7bb1b5f1a392f7472d4d0743daeac22a795d36c1a265573310067b137415ae2e2eee29ab35f0a5621bba908f89095479f918d55e7caf0ba5b0e4b69e6654787bb9ce3800cf5c9d6a93aba40ea42ff95cfd8760226f8290971b2baab7d6078863 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:c5:92:33:8f:19:3b:21:1d:de:ff:a6:e0:c8:6e:89:44:72:65:6d] modulus: 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 public exponent: 10001 ] 2022-07-04 05:03:57.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:03:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:03:57.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:03:57.904 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:03:57.905 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:03:57.905 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:03:57.906 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:03:57.906 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:03:57.907 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:03:57.907 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:03:57.912 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:03:57.913 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:03:57.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:03:57.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:03:58.178 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:03:58.179 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:03:58.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:03:58.180 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:03:58.181 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:03:58.182 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:03:58.182 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:03:58.183 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:03:58.183 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:03:58.184 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:03:58.184 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:03:58.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:03:58.186 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:03:58.186 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:03:58.186 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:03:58.187 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:03:58.192 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:00:a6:4b:f6:87:f1:61:04:da:67:c7:b7:98:c6:a5:88:76:42:2b] modulus: cfd558c813ef68f83f0b4bfe3c2cd00592a96b7cd2232500749342fde0389c5360be1e2feea2b313e8ecec042c0fab0ebfb7eed6b5c43bad2d06f160b48860cb283ee73ea8d2be22cf3d6f9da41e6b2d766749d806569758e00f951608080221ac3376805eae5eb8d3a78385d90327d76cafa0f607ec75a0702bf2a98ef7715bab350dcc88d95dfde2b603718f0a49f4c19327162c49b4b32637c175500adcb5180c4f53560c05d1715bb31245beda4ca3764998b7adcba3243bb1e5d619818f74983d84ad90dff5dc3f94b5688ca660dab8a94349ac3a7ff022834547e8426dccdb1e2ebd8c4c93b0ca8295cf0b4d4802f3b8de7fa4be42610c0aecf70d562b public exponent: 10001 ] 2022-07-04 05:05:38.330 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:05:38.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:05:38.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:05:38.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:05:38.334 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:05:38.335 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:05:38.335 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:05:38.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:05:38.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:05:38.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:05:38.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:05:38.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:05:38.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:05:38.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:05:38.513 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:05:38.514 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:05:38.514 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:05:38.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:05:38.516 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:05:38.517 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:05:38.517 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:05:38.517 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:05:38.518 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:05:38.519 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:05:38.519 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:05:38.519 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:05:38.520 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:05:38.520 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:05:38.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:05:38.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:05:38.524 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:b0:5e:d5:05:f3:6d:dc:55:f5:87:41:3e:8f:36:24:62:0a:45:c0] modulus: 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 public exponent: 10001 ] 2022-07-04 05:08:47.926 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:08:47.927 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:08:47.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:08:47.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:08:47.930 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:08:47.930 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:08:47.930 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:08:47.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:08:47.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:08:47.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:08:47.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:08:47.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:08:47.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:08:47.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:08:48.099 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:08:48.100 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:08:48.100 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:08:48.101 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:08:48.102 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:08:48.103 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:08:48.103 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:08:48.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:08:48.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:08:48.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:08:48.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:08:48.106 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:08:48.107 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:08:48.107 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:08:48.107 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:08:48.108 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:08:48.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:5c:5b:2e:b5:01:34:e7:ab:1a:ee:78:09:4f:db:a2:d8:09:d9:c1] modulus: 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 public exponent: 10001 ] 2022-07-04 05:12:14.960 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:12:14.961 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:12:14.963 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-04 05:12:14.963 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:12:14.964 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-04 05:12:14.964 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:12:14.964 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:12:14.965 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:12:14.965 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:12:14.965 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:12:14.970 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:12:14.971 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:12:14.971 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:12:14.971 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:12:15.099 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:12:15.100 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:12:15.100 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:12:15.100 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:12:15.101 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:12:15.102 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:12:15.102 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:12:15.102 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:12:15.103 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:12:15.103 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:12:15.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:12:15.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:12:15.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:12:15.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:12:15.105 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:12:15.105 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:12:15.109 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:b4:a1:b5:1b:96:0e:52:a7:42:04:af:fe:41:2d:81:3b:d1:23:9f] modulus: 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 public exponent: 10001 ] 2022-07-04 05:13:20.719 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:13:20.721 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:13:20.723 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:13:20.724 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:13:20.724 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-04 05:13:20.725 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:13:20.725 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:13:20.726 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:13:20.726 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:13:20.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:13:20.735 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:13:20.736 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:13:20.737 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:13:20.737 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:13:20.895 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:13:20.895 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:13:20.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:13:20.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:13:20.898 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:13:20.899 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:13:20.899 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:13:20.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:13:20.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:13:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:13:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:13:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:13:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:13:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:13:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:13:20.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:13:20.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:45:82:b6:a4:ff:45:13:f3:ab:ee:a8:ac:64:55:db:c3:99:7e:06] modulus: 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 public exponent: 10001 ] 2022-07-04 05:16:59.785 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:16:59.786 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:16:59.788 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-04 05:16:59.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:16:59.789 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-04 05:16:59.790 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:16:59.790 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:16:59.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:16:59.791 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:16:59.791 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:16:59.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:16:59.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:16:59.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:16:59.797 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:16:59.998 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:16:59.998 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:16:59.999 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:16:59.999 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:17:00.000 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:17:00.000 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:17:00.000 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:17:00.001 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:17:00.001 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:17:00.001 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:17:00.002 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:17:00.002 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:17:00.003 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:17:00.003 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:17:00.003 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:17:00.004 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:17:00.007 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:88:b2:9e:87:70:84:9c:ee:65:c7:3f:2a:5f:2a:9c:33:a5:86:a5] modulus: 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 public exponent: 10001 ] 2022-07-04 05:17:13.054 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-04 05:17:13.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-04 05:17:13.058 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-04 05:17:13.058 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-04 05:17:13.058 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-04 05:17:13.059 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-04 05:17:13.059 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-04 05:17:13.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-04 05:17:13.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-04 05:17:13.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-04 05:17:13.064 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-04 05:17:13.065 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:17:13.065 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-04 05:17:13.065 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:17:13.250 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-04 05:17:13.250 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-04 05:17:13.250 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-04 05:17:13.251 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-04 05:17:13.252 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-04 05:17:13.253 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-04 05:17:13.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:17:13.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:17:13.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:17:13.254 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:17:13.254 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:17:13.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:17:13.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-04 05:17:13.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-04 05:17:13.256 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-04 05:17:13.256 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-04 05:17:13.259 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336344548175902686698176278389656643273672751417 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 04 03:18:40 UTC 2022 Final Date: Sat Jul 03 03:18:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:65:70:51:52:45:3c:ff:a5:f9:3d:14:92:b5:04:03:41:4d:ff:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e6109ca56b0926a0bd54536ccd36751b030f671 907cdb4d2e4e7610c3293e2c1da53286157b19dc a919c44f7f288ce028c9f74dd3cebd99ae3991d0 29114fce5ef1a63c4fe9e114411f32c339823aa0 42077c3b8889df7305c8af623c7c7e2214338929 1c2cd3f76f00efbbd2fae5fa05b70d95634b94ad 01501360b1b510cd3bed22ad0d5ed31bd7ef4282 3e02851f791d365b31a31dafcee22f659a0a6403 38644d872a64e0ea632494f816408fb9482ba952 ae5ebf2c5fef9265f37e1b4e39f4f12cbd70dbbd 16185a2477e59040d163b191ca176f3ba917ff23 abb8e167cd4ff173365d671a592af1d685e5010c 43c8efd65bba96baee652b72f5d4181c3b895b29 be603487ab8de8658500910cba261378d66562ff df1c20d84ac6dd4f71f4c87e951ffcbff01ea863 78f4f4a6493a0154ce7932db75c923f7a161588c 1f90670feaa18f78e0d53be16bdc107dd1c330e4 7be3088df9603b813209f13cb2f0533225a3c16d 20b9d92d4ebb46cf538fa21123bb7c57d425728a cf7d2ea5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:57:3c:49:99:5e:4c:7a:44:39:ef:71:fd:b4:dd:91:e3:9c:83:d6] modulus: a8c8b358350128423297dd0d134561f0709a7343997ef832e391aa3333b65d7c5592aa9a03bddb0c8fc596e5a4b9743ae5c6513e046590d24dd2196d5c409851597bca09a990da17653f271296f18fda4591c038dbc6394a09a48ffb16946feda01a2af1683607489bf1d1daa56486f77725c4e2bab45d4e7948af421a33c6b31afc1a14dd52a76230c367347a255254d06e73e8f602d2b818ab587f5f1e20694e53fe2eea76f48c431d51d13437058c669256261e946ab9d6e4aaea791ba0bc1c90e3c26f68c08fd61fc43f213c83eb3cc2457e869f88c293d209358fc136bf18d65f823cce4c7253e8b98ade4f526522a96a2db3fc5941b87ccc1f8f147599 public exponent: 10001 ]