By type
2022-09-05 02:59:40,227 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-05 02:59:41,072 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-05 02:59:41.833 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Sep 05, 2022 2:59:43 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 05, 2022 2:59:43 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 05, 2022 2:59:43 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 05, 2022 2:59:43 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-05 02:59:44.211 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-05 02:59:44.500 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-09-05 02:59:44.671 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-05 02:59:45.353 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-05 02:59:45.356 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-09-05 02:59:45.357 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-05 02:59:45.361 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-05 02:59:45.399 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-09-05 02:59:45.403 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-09-05 02:59:45.519 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-09-05 02:59:46.086 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 05, 2022 2:59:46 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-05 02:59:46.963 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.556 seconds (JVM running for 9.363) Sep 05, 2022 3:00:12 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-05 03:00:23.920 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 03:00:23.927 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 03:00:23.977 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-05 03:00:23.981 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 03:00:23.996 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-05 03:00:23.999 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 03:00:24.000 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 03:00:24.001 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 03:00:24.001 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 03:00:24.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 03:00:24.012 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 03:00:24.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 03:00:24.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 03:00:24.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 03:00:24.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 03:00:24.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 03:00:28.248 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 03:00:28.251 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 03:00:28.252 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 03:00:28.253 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 03:00:28.263 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 03:00:28.264 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 03:00:28.265 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 03:00:28.266 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 03:00:28.266 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 03:00:28.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 03:00:28.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 03:00:28.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 03:00:28.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 03:00:28.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 03:00:28.284 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 03:00:28.285 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 03:00:28.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:05:da:ca:b7:70:72:2c:46:49:b6:2c:ed:ed:67:28:2e:b0:02:e6] modulus: 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 public exponent: 10001 ] 2022-09-05 04:14:30.395 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:14:30.399 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:14:30.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:14:30.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:14:30.405 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:14:30.406 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:14:30.407 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:14:30.408 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:14:30.409 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:14:30.410 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:14:30.420 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:14:30.422 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:14:30.422 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:14:30.423 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:14:30.790 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:14:30.791 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:14:30.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:14:30.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:14:30.794 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:14:30.795 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:14:30.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:14:30.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:14:30.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:14:30.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:14:30.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:14:30.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:14:30.800 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:14:30.800 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:14:30.801 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:14:30.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:14:30.807 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: d33b7d55eb848b9c90d0a8f1352349b1855ad891e94a0b0d24ec082c796d265239e99c415a2702537d62bc863c744c529b7a48ad4e58c77c72ca52251ae9340eca3060cea3117ad27d5a0c9e90b636bdd3ecdc57a29351275a20394033e34d0eeaa1b44ed7b14aa72300af3d74a398d929f25ae0af21aafe5f2893aa7f191dc7fab047ef1fac7819a917d14a946508ce68f2de7497386ec026fc2db879d5614c2f06735b86b4d5d73c01cd551a25090fadbec39827b5494e4e2aef1f39d788b9c2e97ec49499cd854a77c98d2691248a1ba52a7d1e212a598924ca20fedd08073a26a64ad6b6f492592c56949c9587025771d9515785c11ab9f9ef35c2aabf3475c9378e309994298b8b511ae9d76a7fe22164cf151368226c0a4f17526567d6a89c7197c7854d66d52c942b7312d411e3cf22afef3790b15bdfa732b5523d0678b1eb690a6d007abc1443dc324a8b69ec29b86b48d2611a3d1ad50ed814ae9afb201285adea3750ba6ab761b8151043ea6af9c9aa49412778e48267406f8d57 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:18:c6:dd:46:2b:d1:5f:ac:d7:c0:26:01:f2:cd:3b:cf:ac:af:50] modulus: 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 public exponent: 10001 ] 2022-09-05 04:16:18.293 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:16:18.295 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:16:18.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-05 04:16:18.297 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:16:18.297 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-05 04:16:18.298 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:16:18.299 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:16:18.299 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:16:18.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:16:18.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:16:18.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:16:18.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:16:18.308 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:16:18.308 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:16:18.528 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:16:18.529 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:16:18.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:16:18.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:16:18.532 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:16:18.532 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:16:18.533 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:16:18.533 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:16:18.534 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:16:18.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:16:18.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:16:18.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:16:18.536 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:16:18.536 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:16:18.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:16:18.538 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:16:18.542 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:d3:1b:67:cd:3b:ae:15:11:b7:3c:db:38:3a:1b:c2:da:3b:08:41] modulus: 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 public exponent: 10001 ] 2022-09-05 04:18:26.822 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:18:26.824 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:18:26.826 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-05 04:18:26.826 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:18:26.827 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-05 04:18:26.827 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:18:26.828 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:18:26.828 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:18:26.829 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:18:26.829 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:18:26.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:18:26.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:18:26.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:18:26.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:18:27.171 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:18:27.172 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:18:27.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:18:27.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:18:27.175 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:18:27.175 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:18:27.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:18:27.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:18:27.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:18:27.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:18:27.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:18:27.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:18:27.179 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:18:27.179 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:18:27.179 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:18:27.180 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:18:27.185 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:20:f4:5d:6f:ec:6d:4b:f1:64:ae:a5:90:6f:57:3b:eb:49:c8:24] modulus: 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 public exponent: 10001 ] 2022-09-05 04:21:18.652 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:21:18.654 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:21:18.657 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:21:18.658 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:21:18.659 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:21:18.660 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:21:18.661 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:21:18.661 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:21:18.662 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:21:18.663 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:21:18.668 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:21:18.669 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:21:18.670 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:21:18.670 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:21:18.838 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:21:18.839 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:21:18.839 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:21:18.840 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:21:18.841 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:21:18.842 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:21:18.842 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:21:18.843 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:21:18.843 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:21:18.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:21:18.845 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:21:18.845 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:21:18.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:21:18.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:21:18.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:21:18.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:21:18.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:a1:66:ff:68:97:c0:e4:21:bb:af:d4:08:13:de:88:4a:df:98:26] modulus: a5fcb6be3baa9221d88835a9580e8c5172d7ecc1181aac99653554c6e77f78fcc6364d39b025f6e15f2669d0ea384c3bfcc6bb6506c32e7a56468e0db75065690f25d241b45ca44b7dc064b5e4d393e89320306621a6e50a766c182c5c5f976532ea42d81a0e9effacd842fe9ef3e738b34dcb657fade65e02a31fe688b31358e43654ab893393b404c9d38fbb083b8b12f40d72219cee56cbb989907aaebb958a83b60d1594fceee4831aa441058891098ebd2194e633fc3c2ec15b5d6fc076e12db027389ef3e8abf1f34be7095c2529831bf4aa04e223d68a9b76ba5a7dde191a746f9ef41676e4dce76f016e4a91ab3a8f2eaaa6d5c6bd51943c692f9849 public exponent: 10001 ] 2022-09-05 04:24:46.713 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:24:46.714 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:24:46.716 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:24:46.716 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:24:46.717 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:24:46.717 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:24:46.718 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:24:46.718 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:24:46.718 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:24:46.719 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:24:46.725 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:24:46.725 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:24:46.725 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:24:46.726 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:24:46.972 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:24:46.973 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:24:46.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:24:46.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:24:46.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:24:46.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:24:46.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:24:46.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:24:46.977 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:24:46.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:24:46.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:24:46.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:24:46.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:24:46.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:24:46.981 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:24:46.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:24:46.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:34:c0:7a:d9:a6:df:a1:78:79:25:b8:1e:60:de:68:74:44:50:de] modulus: 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 public exponent: 10001 ] 2022-09-05 04:29:05.543 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:29:05.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:29:05.549 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:29:05.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:29:05.551 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:29:05.552 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:29:05.553 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:29:05.553 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:29:05.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:29:05.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:29:05.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:29:05.561 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:29:05.561 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:29:05.562 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:29:05.705 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:29:05.705 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:29:05.706 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:29:05.706 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:29:05.708 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:29:05.708 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:29:05.709 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:29:05.709 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:29:05.709 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:29:05.710 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:29:05.710 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:29:05.711 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:29:05.712 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:29:05.713 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:29:05.713 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:29:05.714 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:29:05.719 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:5e:60:d7:aa:14:89:4e:39:06:26:4b:1e:ee:ae:fe:5c:9c:f4:65] modulus: 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 public exponent: 10001 ] 2022-09-05 04:33:53.252 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:33:53.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:33:53.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:33:53.262 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:33:53.263 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:33:53.264 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:33:53.265 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:33:53.266 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:33:53.267 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:33:53.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:33:53.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:33:53.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:33:53.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:33:53.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:33:53.473 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:33:53.474 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:33:53.474 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:33:53.475 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:33:53.476 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:33:53.476 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:33:53.477 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:33:53.477 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:33:53.478 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:33:53.478 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:33:53.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:33:53.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:33:53.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:33:53.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:33:53.481 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:33:53.482 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:33:53.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:68:7d:5c:66:72:51:bb:59:ee:2f:ae:23:ee:e4:50:da:0f:a2:91] modulus: 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 public exponent: 10001 ] 2022-09-05 04:36:37.572 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:36:37.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:36:37.575 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-05 04:36:37.576 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:36:37.576 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-05 04:36:37.577 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:36:37.577 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:36:37.578 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:36:37.578 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:36:37.578 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:36:37.585 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:36:37.586 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:36:37.586 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:36:37.587 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:36:37.819 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:36:37.820 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:36:37.820 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:36:37.821 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:36:37.823 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:36:37.824 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:36:37.825 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:36:37.825 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:36:37.826 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:36:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:36:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:36:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:36:37.828 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:36:37.829 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:36:37.829 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:36:37.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:36:37.836 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: d33b7d55eb848b9c90d0a8f1352349b1855ad891e94a0b0d24ec082c796d265239e99c415a2702537d62bc863c744c529b7a48ad4e58c77c72ca52251ae9340eca3060cea3117ad27d5a0c9e90b636bdd3ecdc57a29351275a20394033e34d0eeaa1b44ed7b14aa72300af3d74a398d929f25ae0af21aafe5f2893aa7f191dc7fab047ef1fac7819a917d14a946508ce68f2de7497386ec026fc2db879d5614c2f06735b86b4d5d73c01cd551a25090fadbec39827b5494e4e2aef1f39d788b9c2e97ec49499cd854a77c98d2691248a1ba52a7d1e212a598924ca20fedd08073a26a64ad6b6f492592c56949c9587025771d9515785c11ab9f9ef35c2aabf3475c9378e309994298b8b511ae9d76a7fe22164cf151368226c0a4f17526567d6a89c7197c7854d66d52c942b7312d411e3cf22afef3790b15bdfa732b5523d0678b1eb690a6d007abc1443dc324a8b69ec29b86b48d2611a3d1ad50ed814ae9afb201285adea3750ba6ab761b8151043ea6af9c9aa49412778e48267406f8d57 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:e1:d7:19:95:7d:0b:6c:97:78:4c:83:53:5a:32:5a:8f:fd:b6:ab] modulus: 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 public exponent: 10001 ] 2022-09-05 04:37:59.463 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:37:59.465 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:37:59.467 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:37:59.468 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:37:59.469 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:37:59.469 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:37:59.470 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:37:59.471 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:37:59.471 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:37:59.472 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:37:59.478 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:37:59.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:37:59.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:37:59.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:37:59.664 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:37:59.665 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:37:59.665 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:37:59.666 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:37:59.667 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:37:59.667 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:37:59.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:37:59.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:37:59.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:37:59.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:37:59.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:37:59.670 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:37:59.670 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:37:59.671 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:37:59.671 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:37:59.671 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:37:59.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:a9:86:af:75:f8:15:84:ce:89:a1:19:58:05:cd:64:6f:d9:d9:5d] modulus: dc062c5e3d8660581e794f6b741bbd358720fe3363b61e2466816e1d7c9a8256a320acd5d1dd7437fcd200c50b81455d7063a12ba84d9daa9c9f61bcc0dc37b6c82e1e0167fc109a18ed18d43e468e08a9868d0da55c747e2b68352f036a9829209903fbc66f7edc9324e308491e1d0df5f125fb09bb86d842404f6cd8e54a354a636d2e7eebcc6c3eb2d6dc437ac26f841a50d86b3c02582d40c90bf269915775c128a8d15bfd24a6c5c650221bd49b74ff0253fa83fa7e98939aa26029eaed7fc1c7c0aedb0cc5476ea84ba0d8db2f9f060e4f95b0105f05967fe33eae3492505e994c92f302c977e68bd32385994373ef10ee49dd2e580e1cd8e0b8b8ab7b public exponent: 10001 ] 2022-09-05 04:42:07.726 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:42:07.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:42:07.733 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-05 04:42:07.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:42:07.734 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-05 04:42:07.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:42:07.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:42:07.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:42:07.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:42:07.737 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:42:07.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:42:07.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:42:07.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:42:07.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:42:07.900 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:42:07.900 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:42:07.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:42:07.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:42:07.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:42:07.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:42:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:07.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:07.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:07.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:07.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:07.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:07.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:07.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:42:07.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: d33b7d55eb848b9c90d0a8f1352349b1855ad891e94a0b0d24ec082c796d265239e99c415a2702537d62bc863c744c529b7a48ad4e58c77c72ca52251ae9340eca3060cea3117ad27d5a0c9e90b636bdd3ecdc57a29351275a20394033e34d0eeaa1b44ed7b14aa72300af3d74a398d929f25ae0af21aafe5f2893aa7f191dc7fab047ef1fac7819a917d14a946508ce68f2de7497386ec026fc2db879d5614c2f06735b86b4d5d73c01cd551a25090fadbec39827b5494e4e2aef1f39d788b9c2e97ec49499cd854a77c98d2691248a1ba52a7d1e212a598924ca20fedd08073a26a64ad6b6f492592c56949c9587025771d9515785c11ab9f9ef35c2aabf3475c9378e309994298b8b511ae9d76a7fe22164cf151368226c0a4f17526567d6a89c7197c7854d66d52c942b7312d411e3cf22afef3790b15bdfa732b5523d0678b1eb690a6d007abc1443dc324a8b69ec29b86b48d2611a3d1ad50ed814ae9afb201285adea3750ba6ab761b8151043ea6af9c9aa49412778e48267406f8d57 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:3b:e8:e1:b8:11:8a:d3:ea:4b:b9:96:8c:17:71:2a:72:fa:19:21] modulus: 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 public exponent: 10001 ] 2022-09-05 04:42:30.034 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:42:30.035 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:42:30.036 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-05 04:42:30.036 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:42:30.037 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-05 04:42:30.037 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:42:30.038 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:42:30.038 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:42:30.038 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:42:30.039 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:42:30.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:42:30.044 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:42:30.044 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:42:30.044 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:42:30.418 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:42:30.418 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:42:30.419 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:42:30.419 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:42:30.420 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:42:30.420 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:42:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:30.422 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:30.423 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:30.423 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:30.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:30.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:30.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:30.426 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:42:30.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:7a:df:0a:1a:84:66:e6:2b:45:76:af:b5:f6:d2:ce:cc:57:d6:f5] modulus: c4ab0d86bd935188355ebd19f9daa0cd7b9c2b1c59fa34a57dca1603f367d2754bcc68c17ae4ada89e698048a6e3f7c3ce708bdc6784304d09a527805844f06dc27bf1dd25a9dff354b0f7639ea2b896b76745aae11c9b29d356a07a189b1c6591091a69b73c9bf7766ca918dcad5f15af910627bbb86f0f10562b009bdfaf44c965956dfca356a019e6cd19d1ee011fbb108fe934979cf83804b6b162726bf08338664bb44f8a8cf3d41eab53dadb2e7e7394bc18d87271aea316d31629aada32cab741ac49eeb47e572dc81c55930703d85f78c7862c1b98990ba771fc9b8c943d9e10145910251e2e7b8edd943c2939d7dace638982c546ce70cc6a3e8219 public exponent: 10001 ] 2022-09-05 04:42:57.608 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:42:57.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:42:57.610 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:42:57.611 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:42:57.611 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:42:57.612 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:42:57.612 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:42:57.613 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:42:57.613 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:42:57.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:42:57.619 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:42:57.620 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:42:57.620 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:42:57.620 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:42:57.876 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:42:57.876 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:42:57.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:42:57.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:42:57.878 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:42:57.878 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:42:57.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:57.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:57.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:57.880 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:57.880 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:57.881 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:57.881 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:42:57.881 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:42:57.882 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:42:57.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:42:57.886 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:51:c5:14:8e:50:e4:7f:29:12:83:1f:5c:d5:32:53:13:06:04:7d] modulus: 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 public exponent: 10001 ] 2022-09-05 04:50:16.221 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:50:16.225 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:50:16.228 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:50:16.232 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:50:16.232 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:50:16.233 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:50:16.233 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:50:16.234 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:50:16.234 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:50:16.235 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:50:16.240 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:50:16.240 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:50:16.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:50:16.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:50:16.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:50:16.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:50:16.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:50:16.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:50:16.577 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:50:16.577 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:50:16.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:50:16.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:50:16.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:50:16.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:50:16.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:50:16.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:50:16.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:50:16.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:50:16.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:50:16.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:50:16.588 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:14:b9:0c:94:27:0a:36:3a:8d:8d:9b:bf:6b:30:73:1c:ca:b9:7c] modulus: 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 public exponent: 10001 ] 2022-09-05 04:55:13.097 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:55:13.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:55:13.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:55:13.103 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:55:13.103 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:55:13.104 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:55:13.104 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:55:13.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:55:13.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:55:13.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:55:13.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:55:13.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:55:13.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:55:13.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:55:13.313 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:55:13.314 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:55:13.314 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:55:13.314 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:55:13.316 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:55:13.316 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:55:13.317 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:55:13.317 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:55:13.317 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:55:13.318 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:55:13.318 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:55:13.318 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:55:13.319 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:55:13.319 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:55:13.319 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:55:13.320 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:55:13.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: d33b7d55eb848b9c90d0a8f1352349b1855ad891e94a0b0d24ec082c796d265239e99c415a2702537d62bc863c744c529b7a48ad4e58c77c72ca52251ae9340eca3060cea3117ad27d5a0c9e90b636bdd3ecdc57a29351275a20394033e34d0eeaa1b44ed7b14aa72300af3d74a398d929f25ae0af21aafe5f2893aa7f191dc7fab047ef1fac7819a917d14a946508ce68f2de7497386ec026fc2db879d5614c2f06735b86b4d5d73c01cd551a25090fadbec39827b5494e4e2aef1f39d788b9c2e97ec49499cd854a77c98d2691248a1ba52a7d1e212a598924ca20fedd08073a26a64ad6b6f492592c56949c9587025771d9515785c11ab9f9ef35c2aabf3475c9378e309994298b8b511ae9d76a7fe22164cf151368226c0a4f17526567d6a89c7197c7854d66d52c942b7312d411e3cf22afef3790b15bdfa732b5523d0678b1eb690a6d007abc1443dc324a8b69ec29b86b48d2611a3d1ad50ed814ae9afb201285adea3750ba6ab761b8151043ea6af9c9aa49412778e48267406f8d57 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:eb:86:bb:c2:6d:70:02:bb:12:40:de:64:b6:6d:f0:71:75:4e:cd] modulus: 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 public exponent: 10001 ] 2022-09-05 04:59:50.221 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 04:59:50.225 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 04:59:50.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:59:50.230 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 04:59:50.230 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 04:59:50.231 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 04:59:50.231 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 04:59:50.231 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 04:59:50.232 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 04:59:50.232 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 04:59:50.238 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 04:59:50.239 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:59:50.239 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 04:59:50.240 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:59:50.684 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 04:59:50.685 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 04:59:50.685 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 04:59:50.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 04:59:50.687 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 04:59:50.687 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 04:59:50.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:59:50.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:59:50.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:59:50.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:59:50.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:59:50.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:59:50.690 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 04:59:50.690 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 04:59:50.690 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 04:59:50.691 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 04:59:50.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: d33b7d55eb848b9c90d0a8f1352349b1855ad891e94a0b0d24ec082c796d265239e99c415a2702537d62bc863c744c529b7a48ad4e58c77c72ca52251ae9340eca3060cea3117ad27d5a0c9e90b636bdd3ecdc57a29351275a20394033e34d0eeaa1b44ed7b14aa72300af3d74a398d929f25ae0af21aafe5f2893aa7f191dc7fab047ef1fac7819a917d14a946508ce68f2de7497386ec026fc2db879d5614c2f06735b86b4d5d73c01cd551a25090fadbec39827b5494e4e2aef1f39d788b9c2e97ec49499cd854a77c98d2691248a1ba52a7d1e212a598924ca20fedd08073a26a64ad6b6f492592c56949c9587025771d9515785c11ab9f9ef35c2aabf3475c9378e309994298b8b511ae9d76a7fe22164cf151368226c0a4f17526567d6a89c7197c7854d66d52c942b7312d411e3cf22afef3790b15bdfa732b5523d0678b1eb690a6d007abc1443dc324a8b69ec29b86b48d2611a3d1ad50ed814ae9afb201285adea3750ba6ab761b8151043ea6af9c9aa49412778e48267406f8d57 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:86:25:97:ee:b3:e4:97:e5:b7:5d:59:3a:9b:99:83:ea:8d:b7:68] modulus: c4f6a5ab827354abaa41b4d6289b2ad41e7994e06b272aebdbcc2dd1e465c9da726d7e20bac097d2fa40ed568da1291455e8b49525231a7f656c942ae65b0cb2d63a719ba94a7340b5f4ae3ad9c0fee4e25d3bfb5b7f87332d7513bc29d009e9a9c2145671a9c776103061e866b0f80b0ed6de8834ec793f10fff2e6a9a3d8821f8a4cbf698a456c4bef816d8d7331239d33b77f38e64d60bc3f640d281bd861309468a09440cc82bc81337abceea03c248cf8a2e39a10d3aa5b05d3c914e31e6eb9f131bb571ecc9bd3cb67f6829cc4fa7ee002297b6732f56f555774caf90f7fed43c0ab7c25541b95ac7fd42449f30bafe9c9d595f5f245fddb92ac39d353 public exponent: 10001 ] 2022-09-05 05:05:25.248 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-09-05 05:05:25.254 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-09-05 05:05:25.257 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 05:05:25.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-05 05:05:25.259 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-05 05:05:25.259 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-09-05 05:05:25.260 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-09-05 05:05:25.260 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-09-05 05:05:25.260 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-09-05 05:05:25.261 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-09-05 05:05:25.266 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-09-05 05:05:25.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 05:05:25.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-09-05 05:05:25.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 05:05:25.475 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-09-05 05:05:25.476 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-09-05 05:05:25.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-09-05 05:05:25.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-09-05 05:05:25.479 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-09-05 05:05:25.479 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-09-05 05:05:25.480 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 05:05:25.480 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 05:05:25.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 05:05:25.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 05:05:25.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 05:05:25.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 05:05:25.483 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-05 05:05:25.484 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-09-05 05:05:25.484 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-09-05 05:05:25.486 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-05 05:05:25.490 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 404968730418343990595591348173459009635023417178 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Sep 05 02:57:28 UTC 2022 Final Date: Sat Sep 04 02:57:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:ff:c4:38:2c:49:0a:57:8e:94:2a:63:13:21:e6:a3:63:a2:bf:cf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c19fa54b8c25b21faec58dcc1525789104328951 e00bcb234475cad2ae835854ab41d8184cda9b23 fe679fb8e43193240d15fc0f4d37523c7520e1e5 280f4d45ef4e2eb29f659d8c41d0f8751189e222 99dc1b1f86f7226a6104d0e94c08d29d7b0146cb f8c525f854c8470ab2c1f42e8065086d8c88333c f86f220cd9b88f7418baaa46d3ef073d30aae2c6 3a573853432e9d97fa489d20ba4f90ef40908b88 deac11a2364661e89e5826f7e55842b1361ad128 64ad001457ab474db477036c82fe3bd42d06c9e0 41e2ae21aa537055450b7ea00e271f7790d29115 c718bd065372df6b807cee1967655ee5dc3cc912 9973fef20bd02cd74e23bd515633ee426a582312 b4e9c42228592d506180d931e82965b2cfd073a1 757c33aba8939225c76e7f66e7277a3319e18fc4 a32df004d3d1276e048817b712eca4d92201f693 a6e2f20c8773409346e3107ff2e61cda57b3b0ab 39aa34b50b2b9b4a2fcafd14e9ceb226c8a9d2a1 f86d7ff78d72de728b6e4b3100ac897d67a64957 6f7be71f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:c5:84:14:9c:49:79:2f:33:9c:f7:3c:82:10:28:72:07:01:9c:52] modulus: a6e8082376f227aa4ce46cbe40303e819b404e536857b2c0ddd86cefc38678db4115476c7e8f28856ae0e47fd965bd7b07bb483f757ac39fff6f76297ec2a91ca3f438a8b5bbf16fdcc1fc9b7a25d5e77fe98d1832fbcc9c1ab74235ceb71c3f19202c3e37c828a57e8d1c50ef38f92bf42c36026ec2aacc1e34365f796dc2ac4b79f85c0559ffeef7f169ea9b4c44807967162cb6c1a4cea3eb37b98ea60f6300c7c64a20a8ccf6a3f1efe3b51142a6281ceec21febd61ff83d87c2aee857ffdc759ab679e22175dbe28940927fd43d67a3ff47277bd0c55466fc746fba96eefd0040c0b17330f874b14fd3caf582e66552ef67fd5f0f60a495eb1f440dfb5d public exponent: 10001 ]