By type
2022-07-09 03:29:06,041 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-09 03:29:07,669 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-09 03:29:08.577 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jul 09, 2022 3:29:11 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 09, 2022 3:29:11 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 09, 2022 3:29:11 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 09, 2022 3:29:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-09 03:29:12.423 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-09 03:29:12.795 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-07-09 03:29:13.035 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-09 03:29:13.995 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-09 03:29:13.999 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-09 03:29:14.001 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-09 03:29:14.005 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-09 03:29:14.062 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-09 03:29:14.069 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-09 03:29:14.255 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-07-09 03:29:14.906 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 09, 2022 3:29:15 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-09 03:29:16.164 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.116 seconds (JVM running for 13.705) Jul 09, 2022 3:29:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-09 03:30:03.369 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 03:30:03.401 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 03:30:03.473 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-09 03:30:03.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 03:30:03.504 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-09 03:30:03.508 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 03:30:03.509 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 03:30:03.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 03:30:03.512 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 03:30:03.521 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 03:30:03.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 03:30:03.534 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 03:30:03.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 03:30:03.613 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 03:30:03.614 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 03:30:03.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 03:30:04.722 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 03:30:04.727 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 03:30:04.729 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 03:30:04.732 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 03:30:04.750 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 03:30:04.753 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 03:30:04.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 03:30:04.757 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 03:30:04.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 03:30:04.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 03:30:04.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 03:30:04.786 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 03:30:04.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 03:30:04.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 03:30:04.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 03:30:04.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 03:30:04.837 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:72:ce:26:15:f6:bf:4e:b5:b3:e9:8b:30:6b:c1:fd:c6:a8:02:fd] modulus: dc821234ae0c562308bde9ebdff58ab46b2ed0ccb68ec64964654136c85f0e839bff5c406433af6c143953a600a5fe2513603282389d9e8ebeb947d39e7bde3ddab41231226e98aef71fd609ec5aa72cf0c405fde8813346dfd1a8778e6b2294da1bb5e7c7c74f851e74727b8dc8b80746d04c4c1e9891bade4fbfff2708c13bda890c07dcdc1e8f28eaac215f283ffa5c150a59419340ad3e308c7a763a3155d8c05cd6e216fdc6dd97afab38d569bad9e08dda54a52e5c918203137b154fd9653455e22ed8faa48856cc78070b9ffb4609448c686626daa786c30f5b7fb9fa3d35450dc85ffe756b79c8c37de31f45db809501f965feeb76ef477c12617377 public exponent: 10001 ] 2022-07-09 05:53:14.879 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 05:53:14.884 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 05:53:14.887 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:53:14.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:53:14.889 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:53:14.891 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 05:53:14.892 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 05:53:14.893 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 05:53:14.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 05:53:14.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 05:53:14.906 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 05:53:14.908 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:53:14.909 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:53:14.910 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:53:15.290 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 05:53:15.292 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 05:53:15.293 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 05:53:15.293 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:53:15.298 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 05:53:15.299 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 05:53:15.301 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:53:15.301 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:53:15.302 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:53:15.304 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:53:15.305 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:53:15.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:53:15.307 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:53:15.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:53:15.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:53:15.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:53:15.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:42:f4:9f:f4:9a:f1:9a:18:4c:8c:dd:1e:e1:7c:0f:6f:94:d8:03] modulus: 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 public exponent: 10001 ] 2022-07-09 05:55:03.901 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 05:55:03.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 05:55:03.906 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-09 05:55:03.907 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:55:03.908 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-09 05:55:03.909 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 05:55:03.910 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 05:55:03.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 05:55:03.911 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 05:55:03.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 05:55:03.921 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 05:55:03.922 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:55:03.923 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:55:03.924 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:55:04.277 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 05:55:04.280 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 05:55:04.281 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 05:55:04.281 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:55:04.285 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 05:55:04.286 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 05:55:04.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:55:04.287 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:55:04.288 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:55:04.289 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:55:04.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:55:04.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:55:04.292 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:55:04.292 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:55:04.293 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:55:04.294 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:55:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:52:7c:38:be:bc:cf:79:2f:12:59:51:5d:c4:6f:95:fc:6b:99:68] modulus: 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 public exponent: 10001 ] 2022-07-09 05:56:14.200 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 05:56:14.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 05:56:14.204 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-09 05:56:14.205 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:56:14.206 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-09 05:56:14.206 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 05:56:14.207 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 05:56:14.208 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 05:56:14.208 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 05:56:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 05:56:14.214 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 05:56:14.214 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:56:14.215 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:56:14.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:56:14.542 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 05:56:14.543 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 05:56:14.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 05:56:14.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:56:14.549 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 05:56:14.550 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 05:56:14.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:56:14.552 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:56:14.552 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:56:14.553 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:56:14.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:56:14.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:56:14.555 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:56:14.556 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:56:14.556 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:56:14.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:56:14.565 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:ab:75:17:d1:71:16:83:d0:d4:fc:d8:85:ef:ba:30:fb:c3:a2:dd] modulus: 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 public exponent: 10001 ] 2022-07-09 05:58:34.097 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 05:58:34.099 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 05:58:34.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:58:34.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:58:34.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:58:34.104 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 05:58:34.104 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 05:58:34.105 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 05:58:34.105 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 05:58:34.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 05:58:34.111 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 05:58:34.112 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:58:34.113 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 05:58:34.113 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:58:34.413 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 05:58:34.414 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 05:58:34.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 05:58:34.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:58:34.418 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 05:58:34.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 05:58:34.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:58:34.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:58:34.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:58:34.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:58:34.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:58:34.426 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:58:34.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:58:34.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:58:34.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:58:34.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:58:34.433 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:cc:3a:b5:30:1b:bc:26:d5:34:1f:5b:9b:f7:ca:f5:c9:6a:59:db] modulus: d9cc9cdd4012591525a51d6ae63be1fc75b403b7684658fdb4339748a72b6733d0b5173932b582976e24f93ffc97999d62eb0b2505336726f20811faf9f974cce3978ef782860ae033be13a19ae9090be7008e5a9064e33a238b913efc25c09e48c2ee347255534344bb26913d0e456dde5614599632a2ebb42d7bfedf5b80c381ff79f132710976bddf136ecf93970aa8dcc1f83c509d9e4830ea200d38cf9889107dd7bfe820985255b482a7c709733d40cdf5bf7ac4aeb8cc2cdc2c5fccd1bb8ce6ffccdb7e140ce35b465c928061dca954f390ba07c71712fb122e96cef5546b7d051154823e1e094b030d0ea3a05a6d55f57570df028db8d071c66e0b7b public exponent: 10001 ] 2022-07-09 06:02:39.452 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:02:39.455 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:02:39.459 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:02:39.462 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:02:39.463 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:02:39.472 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:02:39.473 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:02:39.474 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:02:39.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:02:39.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:02:39.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:02:39.497 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:02:39.498 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:02:39.499 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:02:39.914 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:02:39.915 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:02:39.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:02:39.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:02:39.918 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:02:39.919 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:02:39.920 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:02:39.921 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:02:39.923 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:02:39.925 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:02:39.925 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:02:39.925 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:02:39.926 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:02:39.927 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:02:39.927 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:02:39.928 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:02:39.934 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:d5:bc:6b:a5:01:b8:3f:59:9a:7a:6b:c6:11:fb:65:fa:11:fd:2f] modulus: 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 public exponent: 10001 ] 2022-07-09 06:06:21.224 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:06:21.227 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:06:21.232 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:06:21.233 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:06:21.234 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:06:21.235 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:06:21.235 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:06:21.235 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:06:21.236 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:06:21.237 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:06:21.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:06:21.246 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:06:21.246 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:06:21.247 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:06:21.729 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:06:21.729 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:06:21.730 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:06:21.730 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:06:21.733 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:06:21.733 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:06:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:06:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:06:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:06:21.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:06:21.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:06:21.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:06:21.736 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:06:21.736 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:06:21.737 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:06:21.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:06:21.742 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:28:d3:1f:83:ba:95:ea:d4:9e:f1:e6:4b:5d:63:09:e7:77:dd:e1] modulus: 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 public exponent: 10001 ] 2022-07-09 06:08:18.872 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:08:18.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:08:18.879 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:08:18.880 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:08:18.881 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:08:18.882 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:08:18.882 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:08:18.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:08:18.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:08:18.884 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:08:18.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:08:18.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:08:18.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:08:18.894 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:08:19.247 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:08:19.249 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:08:19.249 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:08:19.250 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:08:19.251 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:08:19.251 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:08:19.252 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:08:19.252 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:08:19.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:08:19.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:08:19.254 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:08:19.254 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:08:19.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:08:19.256 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:08:19.256 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:08:19.258 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:08:19.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:25:cd:ff:06:6f:32:c3:93:d5:c4:7d:86:c9:43:a8:35:6a:23:b4] modulus: cacb55b17acc7d84eb7c68c64725b88aa7e8977d24157ac9c70fcce621e05890d0cce237491b52be7d8cf54b01f38baac0020d3fb8403e2d422d9230ab922c305850a51c5c17596768a030d75fb2c173f0ef1c2d9fb721549b1fd958157c2a52bc4282d3710409f9f3e2120fc6885b4638f2ff24ac576f9b3651c60602da52d8b4d4e6f08a84d0a19394fd757af35ffbf06f90fd1a8b7279713b2148c3879cd19ed5cd697ef18849ebd6ab3ebb33bf041703e27acb559d7af33b93833eaca0bd713099201d0a22867ac9ebfcdd5bdb38c02a44ea8df413465a3dc8a73bdabcd65ac4def97f866348986cb62e7393e0da74a9238d96fe3659362406bcb45ab25f public exponent: 10001 ] 2022-07-09 06:10:50.450 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:10:50.452 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:10:50.454 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:10:50.456 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:10:50.456 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:10:50.457 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:10:50.458 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:10:50.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:10:50.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:10:50.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:10:50.468 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:10:50.469 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:10:50.469 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:10:50.470 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:10:50.743 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:10:50.744 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:10:50.745 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:10:50.745 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:10:50.747 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:10:50.748 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:10:50.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:10:50.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:10:50.750 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:10:50.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:10:50.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:10:50.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:10:50.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:10:50.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:10:50.753 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:10:50.754 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:10:50.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:e4:e5:56:b3:e7:51:6d:05:26:df:5e:92:d3:fa:4e:3b:6c:c3:c2] modulus: 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 public exponent: 10001 ] 2022-07-09 06:13:21.994 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:13:21.997 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:13:22.000 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-09 06:13:22.001 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:13:22.001 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-09 06:13:22.002 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:13:22.002 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:13:22.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:13:22.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:13:22.004 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:13:22.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:13:22.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:13:22.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:13:22.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:13:22.315 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:13:22.316 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:13:22.317 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:13:22.317 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:13:22.319 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:13:22.320 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:13:22.321 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:13:22.321 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:13:22.322 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:13:22.323 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:13:22.323 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:13:22.324 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:13:22.325 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:13:22.325 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:13:22.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:13:22.327 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:13:22.332 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:b8:af:ca:df:7f:b0:d6:a7:2d:86:9d:1a:68:af:9e:e2:d3:43:08] modulus: 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 public exponent: 10001 ] 2022-07-09 06:15:18.413 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:15:18.414 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:15:18.417 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:15:18.417 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:15:18.418 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:15:18.419 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:15:18.419 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:15:18.419 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:15:18.420 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:15:18.420 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:15:18.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:15:18.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:15:18.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:15:18.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:15:18.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:15:18.794 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:15:18.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:15:18.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:15:18.799 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:15:18.800 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:15:18.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:15:18.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:15:18.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:15:18.805 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:15:18.806 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:15:18.807 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:15:18.808 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:15:18.810 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:15:18.811 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:15:18.814 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:15:18.823 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:44:74:30:7b:06:2a:4e:c3:81:da:b0:17:c2:16:31:d9:e5:62:fa] modulus: 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 public exponent: 10001 ] 2022-07-09 06:19:49.499 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:19:49.503 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:19:49.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:19:49.510 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:19:49.511 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:19:49.512 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:19:49.513 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:19:49.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:19:49.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:19:49.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:19:49.524 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:19:49.526 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:19:49.527 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:19:49.528 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:19:49.887 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:19:49.889 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:19:49.889 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:19:49.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:19:49.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:19:49.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:19:49.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:19:49.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:19:49.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:19:49.897 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:19:49.897 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:19:49.898 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:19:49.900 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:19:49.900 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:19:49.901 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:19:49.903 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:19:49.910 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:45:d8:37:df:dc:36:45:f0:8e:c2:4e:e0:e5:0d:13:bd:4d:8d:b7] modulus: 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 public exponent: 10001 ] 2022-07-09 06:23:10.470 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:23:10.472 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:23:10.474 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-09 06:23:10.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:23:10.476 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-09 06:23:10.477 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:23:10.477 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:23:10.477 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:23:10.478 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:23:10.478 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:23:10.484 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:23:10.485 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:23:10.485 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:23:10.485 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:10.905 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:23:10.906 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:23:10.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:23:10.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:10.909 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:23:10.909 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:23:10.910 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:10.910 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:10.912 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:10.912 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:10.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:10.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:10.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:10.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:23:10.918 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:ac:56:6a:61:a3:20:83:a5:76:c2:14:ad:80:70:27:3e:dd:89:5d] modulus: ba7425cc9d8c1722aed599c7e2af71132aa97c322be420fa85da87d8f98ccbb26ba4cbdd94c4e07166815d72d73a6563995240d3d00feab916d75a0eb1596abc36ef2cebac077f770a260ba1e354f528ec333097469a19a614cf4d43a5cccb031dc159799f4ddba032f1fd603c61605139ea3fa14d1c914da3b515fd4c1f5f0884f1c20af86f0eb4b3bf7b0edadf196cadbeaedad00501629bc14d4bcc4d99c3f47e8c90ee984a1255186027edff72daa988d81e4de4f440cbb7a16545d5de6ad21a86ba634ddad339f3b77bdb3e59dce345f7f0af031564b3531531a31e375fc4b894e33fa47d489650125d47b03bde7556b88301346c9ddd51c3aa50b956a5 public exponent: 10001 ] 2022-07-09 06:23:30.241 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:23:30.243 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:23:30.244 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-09 06:23:30.245 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:23:30.245 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-09 06:23:30.246 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:23:30.247 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:23:30.247 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:23:30.248 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:23:30.248 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:23:30.253 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:23:30.254 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:23:30.254 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:23:30.254 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:30.572 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:23:30.573 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:23:30.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:23:30.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:30.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:23:30.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:23:30.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:30.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:30.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:30.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:30.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:30.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:30.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:30.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:30.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:30.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:23:30.586 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:4d:2d:d0:e3:50:b3:54:56:d5:0b:a2:a8:cd:0d:54:50:fa:2e:df] modulus: a61b2cb9ce795ded2c86a3399107b96c1fefc36c36ca5d9debcef7cf26461dad29ed27961746ebadf01e7cab1d580a51caf0c749eda78bdd540379bcb358f49775ca72079ef0e9eb1710ec5ffba6966088db9653c685ffa773b620ada5db0b6f7151dad57d6c1c00ac80f8cd25c0d1f4a626f47cbe0967138da05266c93c5c83c57e968c52677f2d5f54947c871607193db1c02667e6b567acf6dcea9a6ed03fcdad5e66ba58097d228a4d1786a2a522799698339735764ba14aa7adefb0be01810912147df255607d071145667881053ec6a24312c5809147c6c8bb757f62daafade746a9dee5f3efce85a9ac105c4d3df63eab9878bc1589ade44741097e23 public exponent: 10001 ] 2022-07-09 06:25:03.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:25:03.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:25:03.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:25:03.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:25:03.856 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:25:03.857 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:25:03.857 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:25:03.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:25:03.858 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:25:03.858 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:25:03.864 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:25:03.865 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:25:03.866 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:25:03.866 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:25:04.219 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:25:04.221 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:25:04.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:25:04.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:25:04.223 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:25:04.224 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:25:04.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:25:04.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:25:04.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:25:04.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:25:04.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:25:04.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:25:04.232 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:25:04.233 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:25:04.235 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:25:04.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:25:04.244 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:a5:7d:1b:70:8d:13:97:0b:59:6b:24:f7:17:4f:9d:1a:9e:22:b9] modulus: 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 public exponent: 10001 ] 2022-07-09 06:29:25.158 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:29:25.161 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:29:25.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:29:25.166 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:29:25.166 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:29:25.167 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:29:25.167 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:29:25.168 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:29:25.168 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:29:25.169 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:29:25.177 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:29:25.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:29:25.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:29:25.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:29:25.755 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:29:25.755 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:29:25.756 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:29:25.756 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:29:25.757 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:29:25.758 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:29:25.758 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:29:25.758 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:29:25.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:29:25.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:29:25.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:29:25.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:29:25.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:29:25.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:29:25.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:29:25.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:29:25.767 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:4c:75:06:4f:13:3a:f6:f2:63:ad:0f:9d:17:27:77:e4:5c:6c:35] modulus: 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 public exponent: 10001 ] 2022-07-09 06:33:43.161 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:33:43.164 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:33:43.169 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:33:43.170 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:33:43.170 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:33:43.171 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:33:43.172 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:33:43.172 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:33:43.173 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:33:43.173 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:33:43.183 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:33:43.184 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:33:43.185 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:33:43.186 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:33:43.805 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:33:43.806 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:33:43.807 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:33:43.807 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:33:43.809 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:33:43.810 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:33:43.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:33:43.811 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:33:43.811 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:33:43.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:33:43.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:33:43.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:33:43.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:33:43.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:33:43.814 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:33:43.815 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:33:43.820 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:ef:ce:eb:2b:32:87:bd:4a:2a:9c:21:0f:46:31:5b:30:59:8f:c1] modulus: 9b99cc1630c955dfb19f08cec6f99bbde80630a89289aed6237c89cb32b2bd43dde334c65cb8fae2a30129facf1b6b33cfe89b147d1cab8c300619c4993d75b3039297854b2300fa07d172e621d3a38e0119be03024a474729f5836086d57d04762b3478773ab7fe4e7baa9dbe48afa5487f980ac6ed233a039bb9821c8b3dca3ed1000928ba891966da5893ea216b53f33a9425c1a65e823ff5733477bbe8fccd38254dfef7cddfdd86ce8fd4341964de84f024de9f58b577228f377bc1c6f921da5e4729176cd9385f22ee2cdb7b63cbe508bdb7d494f9c9367e3fb190860cbf631e6a6aeaed4229cd96e76fcbbfa6b3bafcef6c115bf35816ae381d5dc323 public exponent: 10001 ] 2022-07-09 06:38:43.226 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:38:43.229 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:38:43.231 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:38:43.232 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:38:43.233 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:38:43.234 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:38:43.234 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:38:43.235 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:38:43.235 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:38:43.236 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:38:43.244 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:38:43.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:38:43.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:38:43.247 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:38:43.694 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:38:43.695 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:38:43.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:38:43.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:38:43.698 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:38:43.699 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:38:43.699 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:38:43.699 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:38:43.700 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:38:43.701 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:38:43.701 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:38:43.701 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:38:43.704 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:38:43.704 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:38:43.707 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:38:43.708 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:38:43.714 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:40:c0:73:71:20:56:da:d1:9a:d8:15:fa:53:ef:5e:f7:0e:11:14] modulus: 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 public exponent: 10001 ] 2022-07-09 06:43:02.024 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:43:02.029 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:43:02.031 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:43:02.033 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:43:02.033 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:43:02.034 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:43:02.034 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:43:02.034 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:43:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:43:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:43:02.042 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:43:02.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:43:02.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:43:02.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:43:02.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:43:02.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:43:02.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:43:02.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:43:02.436 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:43:02.436 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:43:02.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:43:02.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:43:02.438 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:43:02.439 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:43:02.439 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:43:02.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:43:02.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:43:02.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:43:02.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:43:02.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:43:02.448 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:ca:5b:43:7c:41:f4:38:3d:e3:e2:33:4a:9b:f0:0a:ec:86:ef:35] modulus: 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 public exponent: 10001 ] 2022-07-09 06:49:20.199 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-09 06:49:20.202 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-09 06:49:20.203 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:49:20.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:49:20.204 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:49:20.205 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-09 06:49:20.205 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-09 06:49:20.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-09 06:49:20.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-09 06:49:20.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-09 06:49:20.213 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-09 06:49:20.214 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:49:20.215 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-09 06:49:20.215 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:49:21.042 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-09 06:49:21.043 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-09 06:49:21.043 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-09 06:49:21.043 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:49:21.044 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-09 06:49:21.045 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-09 06:49:21.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:49:21.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:49:21.046 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:49:21.046 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:49:21.046 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:49:21.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:49:21.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:49:21.048 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:49:21.048 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:49:21.050 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:49:21.054 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:00:e6:76:2d:1b:99:74:f0:29:23:ec:c6:07:bc:f1:29:5b:5b:58] modulus: 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 public exponent: 10001 ]