By type
2022-06-03 08:57:15,551 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-03 08:57:16,905 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-03 08:57:18.201 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 03, 2022 8:57:20 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 03, 2022 8:57:20 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 03, 2022 8:57:20 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 03, 2022 8:57:20 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-03 08:57:21.686 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-03 08:57:22.100 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-03 08:57:22.349 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-03 08:57:23.727 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-03 08:57:23.731 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-03 08:57:23.733 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-03 08:57:23.738 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-03 08:57:23.807 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-06-03 08:57:23.818 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-03 08:57:24.019 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-03 08:57:25.130 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 03, 2022 8:57:26 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-03 08:57:26.705 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 12.286 seconds (JVM running for 14.724) Jun 03, 2022 8:57:47 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-03 08:58:02.998 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 08:58:03.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 08:58:03.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 08:58:03.056 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 08:58:03.079 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 08:58:03.082 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 08:58:03.084 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 08:58:03.085 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 08:58:03.085 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 08:58:03.090 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 08:58:03.098 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 08:58:03.102 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 08:58:03.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 08:58:03.161 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 08:58:03.162 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 08:58:03.171 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 08:58:03.782 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 08:58:03.785 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 08:58:03.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 08:58:03.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 08:58:03.820 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 08:58:03.821 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 08:58:03.822 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 08:58:03.822 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 08:58:03.822 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 08:58:03.834 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 08:58:03.835 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 08:58:03.835 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 08:58:03.842 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 08:58:03.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 08:58:03.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 08:58:03.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 08:58:03.876 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:4f:80:c2:69:7c:2b:c4:cb:45:4d:80:b5:da:26:70:0a:f7:ae:11] modulus: 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 public exponent: 10001 ] 2022-06-03 10:37:32.712 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:37:32.715 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:37:32.719 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:37:32.720 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:37:32.721 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:37:32.722 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:37:32.722 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:37:32.723 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:37:32.723 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:37:32.724 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:37:32.735 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:37:32.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:37:32.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:37:32.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:37:32.997 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:37:32.999 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:37:32.999 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:37:33.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:37:33.003 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:37:33.004 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:37:33.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:37:33.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:37:33.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:37:33.007 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:37:33.008 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:37:33.009 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:37:33.011 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:37:33.011 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:37:33.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:37:33.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:37:33.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 844a2d6daa1f62ec504211cc5fcad43985fb1225b402c3e535a75c5190b14b3642371555bd0eb8836047268a41614de74a3634e47b76a48a9e358688ddba1b29152d27b0751946fd9570ee3640c31da2e53eea5d7ece446e1aa37f68d48a7f5bfdff959e138f79e611fb01ec7432c3119b0dc0a291b0954b5d78de284f35ba09e005e4b2cd1c6898280f50b0678d0be4f43c6a121383a69ea7d3b946e7486fec3e4bf1dc6472c4d204d5d4919696625b77e63dcac9eaaf66d28cfbc3bb5c2a96ee7bb517328fd873a0c22a550ed37b64c99dffbeeb7083cdaeaa84f148bbed7844d61b463b5fe3db41e1e44881ad5cf95594d1a620df9cd3294c10a78293c227d451458e6288776b12de710056ed6bd038182b8a41ef5b1006f0ccbfd79bd9f8f0968aea34a4c584cd2af4f4527eaa11e531529485e3b3af3f9646f4a0e35789fc0cfd64042ea52e360e7f625fbb398c7ac4bde6189f62b2bb3533eb0ece6a3ea2c321f821a8b206b867e63d4986f47c5f1a466a19e5512675246b6c1db1e61f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:31:f3:64:d3:8c:a0:89:45:4d:95:fe:45:af:46:df:ab:7a:69:53] modulus: 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 public exponent: 10001 ] 2022-06-03 10:39:30.321 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:39:30.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:39:30.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 10:39:30.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:39:30.326 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 10:39:30.327 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:39:30.327 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:39:30.328 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:39:30.329 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:39:30.329 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:39:30.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:39:30.337 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:39:30.337 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:39:30.338 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:39:30.513 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:39:30.514 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:39:30.515 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:39:30.515 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:39:30.517 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:39:30.518 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:39:30.519 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:39:30.519 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:39:30.520 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:39:30.521 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:39:30.522 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:39:30.522 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:39:30.523 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:39:30.523 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:39:30.524 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:39:30.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:39:30.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:3a:e9:3c:4a:a0:2d:94:e4:d2:f6:f6:5b:59:66:68:a3:51:6f:3e] modulus: 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 public exponent: 10001 ] 2022-06-03 10:40:52.639 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:40:52.641 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:40:52.643 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 10:40:52.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:40:52.645 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 10:40:52.645 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:40:52.646 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:40:52.646 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:40:52.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:40:52.652 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:40:52.669 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:40:52.671 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:40:52.672 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:40:52.673 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:40:52.906 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:40:52.908 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:40:52.908 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:40:52.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:40:52.911 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:40:52.912 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:40:52.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:40:52.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:40:52.914 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:40:52.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:40:52.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:40:52.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:40:52.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:40:52.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:40:52.918 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:40:52.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:40:52.924 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:e2:c0:06:97:fb:5e:29:8a:82:3f:3b:d8:66:d2:c7:43:d0:96:e6] modulus: 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 public exponent: 10001 ] 2022-06-03 10:42:54.807 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:42:54.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:42:54.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:42:54.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:42:54.811 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:42:54.811 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:42:54.812 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:42:54.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:42:54.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:42:54.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:42:54.818 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:42:54.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:42:54.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:42:54.820 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:42:54.989 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:42:54.990 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:42:54.990 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:42:54.991 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:42:54.993 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:42:54.994 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:42:54.995 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:42:54.995 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:42:54.996 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:42:54.997 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:42:54.997 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:42:54.998 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:42:54.999 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:42:54.999 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:42:55.000 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:42:55.001 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:42:55.006 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 844a2d6daa1f62ec504211cc5fcad43985fb1225b402c3e535a75c5190b14b3642371555bd0eb8836047268a41614de74a3634e47b76a48a9e358688ddba1b29152d27b0751946fd9570ee3640c31da2e53eea5d7ece446e1aa37f68d48a7f5bfdff959e138f79e611fb01ec7432c3119b0dc0a291b0954b5d78de284f35ba09e005e4b2cd1c6898280f50b0678d0be4f43c6a121383a69ea7d3b946e7486fec3e4bf1dc6472c4d204d5d4919696625b77e63dcac9eaaf66d28cfbc3bb5c2a96ee7bb517328fd873a0c22a550ed37b64c99dffbeeb7083cdaeaa84f148bbed7844d61b463b5fe3db41e1e44881ad5cf95594d1a620df9cd3294c10a78293c227d451458e6288776b12de710056ed6bd038182b8a41ef5b1006f0ccbfd79bd9f8f0968aea34a4c584cd2af4f4527eaa11e531529485e3b3af3f9646f4a0e35789fc0cfd64042ea52e360e7f625fbb398c7ac4bde6189f62b2bb3533eb0ece6a3ea2c321f821a8b206b867e63d4986f47c5f1a466a19e5512675246b6c1db1e61f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:6d:b5:63:26:14:a6:09:07:c2:95:73:8c:19:af:23:b8:2b:40:c4] modulus: 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 public exponent: 10001 ] 2022-06-03 10:46:27.498 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:46:27.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:46:27.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:46:27.511 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:46:27.512 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:46:27.513 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:46:27.513 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:46:27.513 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:46:27.514 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:46:27.514 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:46:27.521 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:46:27.522 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:46:27.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:46:27.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:46:27.703 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:46:27.704 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:46:27.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:46:27.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:46:27.708 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:46:27.709 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:46:27.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:46:27.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:46:27.711 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:46:27.712 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:46:27.713 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:46:27.713 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:46:27.714 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:46:27.714 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:46:27.714 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:46:27.715 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:46:27.720 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:26:d1:4f:e0:09:54:ab:5f:1b:d8:30:34:e9:bc:fc:7e:c5:c2:38] modulus: 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 public exponent: 10001 ] 2022-06-03 10:50:35.097 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:50:35.099 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:50:35.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:50:35.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:50:35.102 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:50:35.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:50:35.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:50:35.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:50:35.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:50:35.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:50:35.109 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:50:35.110 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:50:35.111 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:50:35.111 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:50:35.271 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:50:35.272 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:50:35.273 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:50:35.274 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:50:35.280 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:50:35.286 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:50:35.287 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:50:35.287 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:50:35.288 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:50:35.291 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:50:35.291 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:50:35.292 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:50:35.293 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:50:35.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:50:35.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:50:35.296 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:50:35.302 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:65:de:d8:19:88:77:b6:c5:c3:1b:9e:f0:4d:a8:d9:b6:33:67:c1] modulus: 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 public exponent: 10001 ] 2022-06-03 10:54:07.876 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:54:07.878 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:54:07.880 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:54:07.881 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:54:07.882 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:54:07.882 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:54:07.883 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:54:07.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:54:07.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:54:07.884 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:54:07.889 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:54:07.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:54:07.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:54:07.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:54:08.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:54:08.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:54:08.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:54:08.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:54:08.039 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:54:08.040 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:54:08.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:54:08.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:54:08.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:54:08.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:54:08.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:54:08.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:54:08.043 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:54:08.043 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:54:08.044 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:54:08.045 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:54:08.049 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:02:8e:bd:1b:93:eb:1e:51:13:c7:bc:6b:9c:00:bd:9a:e1:4a:6f] modulus: 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 public exponent: 10001 ] 2022-06-03 10:58:15.303 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:58:15.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:58:15.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:58:15.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:58:15.309 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 10:58:15.310 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:58:15.310 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:58:15.311 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:58:15.311 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:58:15.312 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:58:15.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:58:15.320 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:58:15.320 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:58:15.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:58:15.485 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:58:15.486 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:58:15.486 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:58:15.486 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:58:15.489 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:58:15.489 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:58:15.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:58:15.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:58:15.491 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:58:15.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:58:15.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:58:15.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:58:15.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:58:15.494 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:58:15.494 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:58:15.495 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:58:15.500 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:8c:a0:d8:df:91:65:ef:ca:e9:43:9b:e5:49:55:e8:d2:2b:68:1c] modulus: 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 public exponent: 10001 ] 2022-06-03 10:58:23.589 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 10:58:23.591 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 10:58:23.595 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 10:58:23.596 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 10:58:23.597 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 10:58:23.597 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 10:58:23.598 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 10:58:23.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 10:58:23.599 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 10:58:23.599 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 10:58:23.606 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 10:58:23.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:58:23.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 10:58:23.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:58:23.742 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 10:58:23.743 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 10:58:23.744 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 10:58:23.744 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 10:58:23.746 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 10:58:23.747 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 10:58:23.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:58:23.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:58:23.749 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:58:23.750 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:58:23.750 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:58:23.750 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:58:23.752 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 10:58:23.752 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 10:58:23.752 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 10:58:23.754 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 10:58:23.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:44:d0:dd:2b:9b:0a:38:44:12:6f:d4:43:26:1a:87:c6:31:8c:1d] modulus: 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 public exponent: 10001 ] 2022-06-03 11:01:55.664 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:01:55.668 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:01:55.676 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:01:55.679 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:01:55.681 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:01:55.682 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:01:55.683 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:01:55.683 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:01:55.684 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:01:55.684 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:01:55.689 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:01:55.690 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:01:55.690 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:01:55.691 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:01:55.899 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:01:55.900 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:01:55.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:01:55.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:01:55.902 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:01:55.903 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:01:55.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:01:55.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:01:55.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:01:55.905 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:01:55.905 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:01:55.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:01:55.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:01:55.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:01:55.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:01:55.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:01:55.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:20:50:77:54:e0:51:d5:a3:42:32:09:3b:07:b9:05:10:4a:35:2d] modulus: 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 public exponent: 10001 ] 2022-06-03 11:03:42.423 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:03:42.425 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:03:42.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 11:03:42.429 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:03:42.429 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 11:03:42.430 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:03:42.431 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:03:42.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:03:42.432 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:03:42.432 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:03:42.438 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:03:42.439 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:03:42.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:03:42.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:03:42.560 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:03:42.561 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:03:42.563 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:03:42.563 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:03:42.574 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:03:42.575 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:03:42.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:03:42.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:03:42.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:03:42.578 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:03:42.578 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:03:42.579 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:03:42.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:03:42.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:03:42.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:03:42.582 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:03:42.597 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 844a2d6daa1f62ec504211cc5fcad43985fb1225b402c3e535a75c5190b14b3642371555bd0eb8836047268a41614de74a3634e47b76a48a9e358688ddba1b29152d27b0751946fd9570ee3640c31da2e53eea5d7ece446e1aa37f68d48a7f5bfdff959e138f79e611fb01ec7432c3119b0dc0a291b0954b5d78de284f35ba09e005e4b2cd1c6898280f50b0678d0be4f43c6a121383a69ea7d3b946e7486fec3e4bf1dc6472c4d204d5d4919696625b77e63dcac9eaaf66d28cfbc3bb5c2a96ee7bb517328fd873a0c22a550ed37b64c99dffbeeb7083cdaeaa84f148bbed7844d61b463b5fe3db41e1e44881ad5cf95594d1a620df9cd3294c10a78293c227d451458e6288776b12de710056ed6bd038182b8a41ef5b1006f0ccbfd79bd9f8f0968aea34a4c584cd2af4f4527eaa11e531529485e3b3af3f9646f4a0e35789fc0cfd64042ea52e360e7f625fbb398c7ac4bde6189f62b2bb3533eb0ece6a3ea2c321f821a8b206b867e63d4986f47c5f1a466a19e5512675246b6c1db1e61f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:90:4f:3c:ce:0b:35:34:77:a6:37:b6:89:ad:96:e8:f3:58:a2:10] modulus: c07579964d0ebb971553289c998dd59fb8014c4773516f8ddc8256d47a2e74495a321cfc94c7bd9fb84dd699142fae2b7e1785c532c2e4ccca1e4eb1e32fa4b7a395297b26572d6c80a36e45fb9f2e57686bb13ff9e85b55b6ac14afcf7bfbb29aa33daacca84ca12b946c000dcbfcd73f5cc71e58f8251f27656525da39363c97e565da7a946d3eb74beb1566642c741b72369899ea956b7483a0604d8b3bc5b184c67e9ce24bc33a9c9ceaa8b960d9bf60420f5712dd1b46f3a5f08d0dbbc9394540abbfd430aecac5e6c8f103e6a08253d99b169bc15c7960e0b1b004bc5ad381831707a1d9441fe18521e092c653572c0bb40e20aa2b69019bb9a4dd5433 public exponent: 10001 ] 2022-06-03 11:03:57.614 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:03:57.616 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:03:57.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 11:03:57.619 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:03:57.619 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 11:03:57.620 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:03:57.620 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:03:57.621 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:03:57.621 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:03:57.622 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:03:57.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:03:57.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:03:57.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:03:57.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:03:57.781 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:03:57.781 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:03:57.782 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:03:57.783 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:03:57.785 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:03:57.785 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:03:57.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:03:57.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:03:57.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:03:57.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:03:57.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:03:57.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:03:57.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:03:57.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:03:57.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:03:57.790 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:03:57.794 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:c2:d6:cd:ab:ce:6e:65:2e:57:d0:58:04:87:15:12:f7:df:d1:7d] modulus: c9091e5f10fe67cbd20205420c623b390001656c9f19a3f4f6cda8f380e1c16f6ce38a40cb65fbf33d4e87996826454e4145c6c8a4ee6f0f9dd9fceab1211616b7bd0d4691f0f8eecb81f1c14a19564d5a53d6df0da2aa9bb4e7bfec040887df54fbe8051c35d384f2e97096ea8bc1d58472607949ab4162c727666d7cb304c35ec5c8e237166e184a98a3819c94c5f88226e164e8cb8b00e7972ba7b532ee32fc64793f3af13358da3e03a5ef6b81ca04f9c16da2ba5fdfcb6477c79d71f29c591d3ddb2e1a139965c6702d4c7de628093ffd9a8c45504b84a7c842fd11527ae88dbbd0c7b178d4a42ccd991ffa83aa1f69e2c8cfd8a7b4f81b1750ba369b27 public exponent: 10001 ] 2022-06-03 11:06:32.791 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:06:32.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:06:32.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:06:32.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:06:32.803 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:06:32.804 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:06:32.805 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:06:32.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:06:32.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:06:32.807 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:06:32.813 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:06:32.814 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:06:32.814 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:06:32.815 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:06:32.972 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:06:32.974 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:06:32.975 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:06:32.976 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:06:32.977 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:06:32.978 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:06:32.978 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:06:32.978 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:06:32.979 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:06:32.980 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:06:32.980 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:06:32.980 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:06:32.981 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:06:32.981 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:06:32.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:06:32.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:06:32.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:c6:51:7c:8e:e1:ed:37:ac:b6:53:c3:dc:bc:d4:c7:24:62:2b:3b] modulus: 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 public exponent: 10001 ] 2022-06-03 11:10:44.725 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:10:44.729 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:10:44.732 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:10:44.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:10:44.733 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:10:44.734 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:10:44.734 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:10:44.735 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:10:44.735 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:10:44.736 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:10:44.742 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:10:44.743 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:10:44.743 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:10:44.744 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:10:44.924 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:10:44.925 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:10:44.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:10:44.926 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:10:44.927 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:10:44.927 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:10:44.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:10:44.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:10:44.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:10:44.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:10:44.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:10:44.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:10:44.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:10:44.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:10:44.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:10:44.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:10:44.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:c9:0f:54:09:6c:ed:d4:06:45:d4:ff:0f:b4:92:c7:1c:7d:1b:a4] modulus: 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 public exponent: 10001 ] 2022-06-03 11:15:31.870 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:15:31.872 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:15:31.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:15:31.877 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:15:31.877 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:15:31.878 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:15:31.879 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:15:31.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:15:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:15:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:15:31.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:15:31.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:15:31.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:15:31.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:15:32.099 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:15:32.100 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:15:32.100 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:15:32.101 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:15:32.103 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:15:32.104 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:15:32.104 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:15:32.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:15:32.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:15:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:15:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:15:32.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:15:32.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:15:32.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:15:32.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:15:32.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:15:32.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:51:0e:13:11:91:c7:51:5a:91:33:0d:14:81:30:2d:48:7f:86:3b] modulus: d4ff950502741e502d7abbc9bdd69b809c879037714769b62f67b38ee52df4ff8cf967e98354c187830cbe439dfe28db72247285c2164b330b93459293e0238c014b590639ecb415b35e00479fe69d47f1c03897e075a8e1c61b4ab624b200de4395239a863af017d50335527b45a4dd744d2c14263e985065f1829ecffc8dfa2888ceb9f1f6e1feb589b3cb5164bc3837c64cc16312d0e3dccecef7ac3e9a6b26afe6845094a5e90cdca46f7ca3cd30d0fc5f2a88b32a668834fe3d4974ed7cd6af203c7d3dd0fedbb5c69ef56731e6a03b2da967ff970c51ce791d43cf889a0b747be6de0d72867a60271c38c6cfda6a71bbeb214fd5cfac327df61a920bf3 public exponent: 10001 ] 2022-06-03 11:21:30.361 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:21:30.365 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:21:30.368 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:21:30.369 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:21:30.370 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:21:30.370 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:21:30.371 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:21:30.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:21:30.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:21:30.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:21:30.379 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:21:30.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:21:30.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:21:30.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:21:30.548 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:21:30.549 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:21:30.549 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:21:30.550 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:21:30.553 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:21:30.554 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:21:30.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:21:30.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:21:30.555 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:21:30.555 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:21:30.556 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:21:30.556 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:21:30.557 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:21:30.557 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:21:30.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:21:30.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:21:30.565 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332729816597490596483103427969620686318447473913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:54:56 UTC 2022 Final Date: Wed Jun 02 08:54:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:5d:cb:c9:f5:72:e4:76:d3:d3:0a:27:f4:1d:00:53:63:f0:f8:c9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6b0c0ce01ae33911de21576c5c2bc92c6d469591 8a40e6b3606fb6710313cbb141ddcf50afad0f60 10cc4cab2ecc5839fdadc77c3d395399850f4719 f174f936202f2c6274057b1c2a4ec62e8988612d cb45a4353163e114e81111cfdbe6666282581655 4fecd9f52bbc9c29d43f987a58316d09c839e7d2 d43e4771d60048dbbbb261758efd029a2c657595 6871142a30422999542d898f1e288839222c8502 3021e3bc708ed94a97c23001aae661244c78a2c4 19690ce3d40c0167de667bc61a489a1dff95fbd7 8420104ea81f15352f7f94ee151c96cf1536551d 2c0c405c2c63ce58af39b8671bc6ded3d0e07510 35b559eb4bad21fb9cca33872d7605841985005d 8ab940311fe3fe973727cdb0aeceda183e591db0 1fcf00774d028e56623da93247c17a504b45e61c 24b72eb09ac897f2c6c1fdcf763796aa46f42312 3787bc61758fca1424d11265af915fc8daf48152 ce5f20b28a50b10bd9e6c679e3b4685fdf50f029 5bf8a4b20b368f8e3eb1e35aa58802f8f40614f0 dacbc3cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:ab:27:da:73:cf:45:bb:fe:97:a2:b3:07:5e:95:e7:5d:f2:61:14] modulus: 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 public exponent: 10001 ]