By type
2022-06-04 05:08:57,239 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-04 05:08:58,433 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-04 05:08:59.255 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 04, 2022 5:09:01 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 04, 2022 5:09:01 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 04, 2022 5:09:01 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 04, 2022 5:09:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-04 05:09:02.013 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-04 05:09:02.318 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-04 05:09:02.476 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-04 05:09:03.201 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-04 05:09:03.204 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-04 05:09:03.205 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-04 05:09:03.209 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-04 05:09:03.247 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-04 05:09:03.251 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-04 05:09:03.373 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-04 05:09:03.963 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 04, 2022 5:09:04 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-04 05:09:04.886 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.541 seconds (JVM running for 10.338) Jun 04, 2022 5:09:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-04 05:09:43.465 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 05:09:43.473 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 05:09:43.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-04 05:09:43.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:09:43.534 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-04 05:09:43.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 05:09:43.538 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 05:09:43.539 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 05:09:43.539 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 05:09:43.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 05:09:43.549 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 05:09:43.553 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 05:09:43.601 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 05:09:43.606 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 05:09:43.606 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 05:09:43.610 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:09:44.359 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 05:09:44.361 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 05:09:44.362 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 05:09:44.364 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:09:44.373 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 05:09:44.374 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 05:09:44.375 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:09:44.375 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:09:44.376 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:09:44.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:09:44.388 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:09:44.389 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:09:44.397 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:09:44.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:09:44.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:09:44.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:09:44.434 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:ea:e4:62:cd:ed:38:06:59:cd:7e:05:3a:80:c6:86:07:2f:34:c3] modulus: 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 public exponent: 10001 ] 2022-06-04 07:21:16.432 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:21:16.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:21:16.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:21:16.451 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:21:16.453 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:21:16.455 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:21:16.456 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:21:16.456 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:21:16.457 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:21:16.457 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:21:16.470 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:21:16.473 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:21:16.474 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:21:16.474 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:21:16.748 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:21:16.749 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:21:16.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:21:16.750 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:21:16.753 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:21:16.754 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:21:16.754 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:21:16.756 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:21:16.756 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:21:16.758 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:21:16.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:21:16.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:21:16.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:21:16.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:21:16.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:21:16.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:21:16.771 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:ef:4d:fb:04:12:03:ae:7a:55:60:73:9b:96:71:5c:34:12:67:c0] modulus: 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 public exponent: 10001 ] 2022-06-04 07:23:05.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:23:05.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:23:05.407 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-04 07:23:05.408 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:23:05.409 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-04 07:23:05.410 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:23:05.410 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:23:05.419 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:23:05.420 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:23:05.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:23:05.435 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:23:05.436 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:23:05.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:23:05.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:23:05.672 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:23:05.673 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:23:05.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:23:05.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:23:05.683 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:23:05.684 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:23:05.685 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:23:05.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:23:05.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:23:05.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:23:05.690 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:23:05.691 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:23:05.692 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:23:05.693 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:23:05.693 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:23:05.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:23:05.701 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:1e:8f:a6:69:82:bc:14:c5:8e:62:0b:b7:53:14:85:b0:2a:f7:21] modulus: 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 public exponent: 10001 ] 2022-06-04 07:24:30.437 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:24:30.439 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:24:30.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-04 07:24:30.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:24:30.442 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-04 07:24:30.443 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:24:30.444 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:24:30.444 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:24:30.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:24:30.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:24:30.450 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:24:30.451 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:24:30.451 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:24:30.452 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:24:30.742 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:24:30.743 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:24:30.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:24:30.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:24:30.746 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:24:30.746 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:24:30.747 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:24:30.747 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:24:30.748 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:24:30.748 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:24:30.748 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:24:30.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:24:30.750 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:24:30.751 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:24:30.751 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:24:30.752 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:24:30.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:c2:57:4c:0d:17:da:8e:e7:2e:7b:c1:d8:ef:1b:bf:4d:4f:86:5c] modulus: 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 public exponent: 10001 ] 2022-06-04 07:27:30.857 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:27:30.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:27:30.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:27:30.865 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:27:30.866 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:27:30.867 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:27:30.867 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:27:30.868 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:27:30.869 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:27:30.869 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:27:30.875 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:27:30.877 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:27:30.877 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:27:30.878 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:27:31.213 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:27:31.214 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:27:31.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:27:31.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:27:31.218 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:27:31.218 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:27:31.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:27:31.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:27:31.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:27:31.220 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:27:31.220 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:27:31.221 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:27:31.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:27:31.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:27:31.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:27:31.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:27:31.231 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: da79eac87df550fb8041945916257cdcbb01fd220fb1e46a75e2048b5c3ec3a532a910d781d3d63e580df2e31467325d0052533ef17b138aabf2a9704c1c769ef4232b4ab68269a0287a5ec409afc2a892bb0649652461475c5dc058821e20bc24c95670bdff7e6a6580c41c1795721e40ca3a238112abec0b6456fa13ef63b271848167c2e7f3ef521a4bd9ca1a758437ab5e468331840895b3c07071b11b0d06326fc21e26c140936edb9df71b7b8afd8299fb745ae0cbe8cfa054e847f3688a6b2eb6acba6bfb61e3b80c6df9928394b0f2e41ec2f24d9f94bc5ab507b43441bd52858aed97352a488b9a99f6b68835804c18305a0e3285b9ca0a32cd7b0105bb3f420321ae6b4aef378acfb8e9f79fd3b0d38355cb54b6b62c75bd56706a863e0942db2a229765194fd796369ead2785ba7997fac73d0041110162fa332f1deee6fe8462ab097a6ed4b8871701ff3a2fd066cc669e70176108e5060bc425a104cfa31aa60621476a0ddcab8892bb55977d691aedec92aa5f9056df265d4b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:26:5b:3e:8f:f9:40:8c:01:d1:93:a8:bf:55:14:bc:86:20:66:fa] modulus: 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 public exponent: 10001 ] 2022-06-04 07:31:12.036 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:31:12.043 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:31:12.050 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:31:12.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:31:12.053 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:31:12.054 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:31:12.054 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:31:12.055 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:31:12.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:31:12.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:31:12.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:31:12.068 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:31:12.069 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:31:12.069 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:31:12.341 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:31:12.342 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:31:12.342 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:31:12.343 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:31:12.344 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:31:12.345 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:31:12.345 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:31:12.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:31:12.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:31:12.347 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:31:12.347 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:31:12.348 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:31:12.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:31:12.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:31:12.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:31:12.350 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:31:12.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: da79eac87df550fb8041945916257cdcbb01fd220fb1e46a75e2048b5c3ec3a532a910d781d3d63e580df2e31467325d0052533ef17b138aabf2a9704c1c769ef4232b4ab68269a0287a5ec409afc2a892bb0649652461475c5dc058821e20bc24c95670bdff7e6a6580c41c1795721e40ca3a238112abec0b6456fa13ef63b271848167c2e7f3ef521a4bd9ca1a758437ab5e468331840895b3c07071b11b0d06326fc21e26c140936edb9df71b7b8afd8299fb745ae0cbe8cfa054e847f3688a6b2eb6acba6bfb61e3b80c6df9928394b0f2e41ec2f24d9f94bc5ab507b43441bd52858aed97352a488b9a99f6b68835804c18305a0e3285b9ca0a32cd7b0105bb3f420321ae6b4aef378acfb8e9f79fd3b0d38355cb54b6b62c75bd56706a863e0942db2a229765194fd796369ead2785ba7997fac73d0041110162fa332f1deee6fe8462ab097a6ed4b8871701ff3a2fd066cc669e70176108e5060bc425a104cfa31aa60621476a0ddcab8892bb55977d691aedec92aa5f9056df265d4b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:38:45:61:4b:8e:d3:8d:69:31:96:8b:c1:f4:df:1b:89:87:ba:5e] modulus: d7abcf5939839df9ffa9bfc888bc383d6c8af2848b6b10aeac9207e8389ba7e2bf425a2e7e67b45dde5842c724fc7d28bdf708dc30aad2819a2f5500642d72de97700251951f9aba9dfe4f6abdf5b5abece08591aee5d73891fd06ef2ddc9aab7c49c2e576cca561a9b65c542be86b2f0c05a9ea8b764970f306be2792b13a7043be75e4de08886648b6f6fe72ad7ea382ba3e6cde1c166cb5ab1365636da8d669d83db62753cf0685b2f50dab471b98e1ac8655073adcc1fdbb8476370b20113bb5ab688b80c8c74b8e966bf86f17c61796a6b64a25c56d284bb0ac1509f5377feca73394b8c70ca5a4ce0ee4b9922e373d8c5c5a601ab4748c6f59355061db public exponent: 10001 ] 2022-06-04 07:36:02.098 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:36:02.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:36:02.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:36:02.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:36:02.106 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:36:02.107 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:36:02.107 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:36:02.108 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:36:02.108 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:36:02.109 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:36:02.114 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:36:02.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:36:02.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:36:02.116 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:36:02.446 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:36:02.447 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:36:02.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:36:02.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:36:02.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:36:02.450 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:36:02.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:36:02.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:36:02.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:36:02.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:36:02.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:36:02.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:36:02.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:36:02.458 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:36:02.458 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:36:02.459 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:36:02.465 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:13:4c:0e:e3:19:ea:b4:f8:bb:9f:38:50:79:85:1b:69:cf:ad:06] modulus: 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 public exponent: 10001 ] 2022-06-04 07:40:39.090 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:40:39.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:40:39.097 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:40:39.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:40:39.099 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:40:39.100 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:40:39.100 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:40:39.101 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:40:39.101 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:40:39.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:40:39.107 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:40:39.109 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:40:39.109 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:40:39.109 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:40:39.342 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:40:39.343 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:40:39.344 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:40:39.344 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:40:39.345 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:40:39.346 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:40:39.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:40:39.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:40:39.355 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:40:39.356 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:40:39.356 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:40:39.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:40:39.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:40:39.358 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:40:39.358 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:40:39.359 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:40:39.365 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:a1:d9:42:ec:3f:11:4e:5a:ac:8b:b7:f3:4b:b3:07:44:8d:88:4e] modulus: 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 public exponent: 10001 ] 2022-06-04 07:44:20.908 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:44:20.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:44:20.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:44:20.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:44:20.918 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:44:20.918 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:44:20.919 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:44:20.919 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:44:20.920 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:44:20.920 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:44:20.928 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:44:20.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:44:20.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:44:20.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:44:21.223 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:44:21.224 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:44:21.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:44:21.225 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:44:21.227 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:44:21.228 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:44:21.229 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:44:21.230 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:44:21.230 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:44:21.232 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:44:21.232 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:44:21.232 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:44:21.233 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:44:21.234 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:44:21.234 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:44:21.235 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:44:21.240 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:37:7c:4e:69:d1:e5:f1:1b:ec:b6:11:7e:77:c5:23:3a:c9:aa:89] modulus: af4706672cc2711231fcd262419488eead71eec989e32b7b39c79ef5af27c979aac5e2d01718ef86cf11783e00eb9d6d9efdd1c68b884fafb69e3934249852f3d0ba9a2d8b601bf65111dc4ff195b29abfb26eb7cb4855ea2f15b182ccdb74eabd731d9e860ce0c13492e44065a6d994f294aa4d104d98fa8589e468876b2bb8fdfdf2bc499b509e8b53f048a96dfb7d9b6e56bf89ddd376b77827e39baf0dfdee7903066513336087aa6e6f56313834ce4d793901dc624adfad9b323fc56909d0fd0890f4124046cfcbccc50605b190c1b8eaecc216c6bd2feb0a2fc172d2e8e50d0ce85265d8d4842aa8c8efa3364421fc6a2ab2fa9a7f02ab62bfaa1e607f public exponent: 10001 ] 2022-06-04 07:48:47.036 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:48:47.040 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:48:47.044 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:48:47.045 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:48:47.046 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:48:47.047 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:48:47.047 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:48:47.048 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:48:47.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:48:47.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:48:47.056 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:48:47.057 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:48:47.058 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:48:47.058 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:48:47.343 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:48:47.344 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:48:47.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:48:47.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:48:47.347 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:48:47.348 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:48:47.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:48:47.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:48:47.349 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:48:47.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:48:47.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:48:47.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:48:47.351 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:48:47.351 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:48:47.351 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:48:47.352 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:48:47.357 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: da79eac87df550fb8041945916257cdcbb01fd220fb1e46a75e2048b5c3ec3a532a910d781d3d63e580df2e31467325d0052533ef17b138aabf2a9704c1c769ef4232b4ab68269a0287a5ec409afc2a892bb0649652461475c5dc058821e20bc24c95670bdff7e6a6580c41c1795721e40ca3a238112abec0b6456fa13ef63b271848167c2e7f3ef521a4bd9ca1a758437ab5e468331840895b3c07071b11b0d06326fc21e26c140936edb9df71b7b8afd8299fb745ae0cbe8cfa054e847f3688a6b2eb6acba6bfb61e3b80c6df9928394b0f2e41ec2f24d9f94bc5ab507b43441bd52858aed97352a488b9a99f6b68835804c18305a0e3285b9ca0a32cd7b0105bb3f420321ae6b4aef378acfb8e9f79fd3b0d38355cb54b6b62c75bd56706a863e0942db2a229765194fd796369ead2785ba7997fac73d0041110162fa332f1deee6fe8462ab097a6ed4b8871701ff3a2fd066cc669e70176108e5060bc425a104cfa31aa60621476a0ddcab8892bb55977d691aedec92aa5f9056df265d4b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:c2:bc:9e:6f:6a:b7:c7:2f:c9:e3:96:4d:14:03:99:6d:9b:9d:26] modulus: a37ac8809d58d76845e12bf18882109c27e0456e4b836374eeb35588049582f2b4ee4a0add7f1dbeb6c6b90446a1b7848f86b54778c095a69134fbe920adafe44afc01d61e7e616743e2b2a1140616e63ba63fceb19ffa6a6c236bbf5fdb49514f2f48a0c0ce9e070b322f15a64e7cc7a2f0d675cc307b476822f923db0868d51e0cbcfc7704a17495fda0da01740fa14094acd163b0437d8b8712fadb3ca47ba4dc6172dd34240f040b1f6a87271106cf7aabc9c1cea791013fa4928b3c30d046a74abac4bb180d89170e9586540f4ce66c88517c8c4ecfa79c2c203a05f59a577b71137ad7fa146b69d96e11cb7c800aafe45286adcea336fd5c2e43ce3b29 public exponent: 10001 ] 2022-06-04 07:52:56.854 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:52:56.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:52:56.872 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:52:56.875 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:52:56.876 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:52:56.876 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:52:56.877 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:52:56.878 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:52:56.878 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:52:56.879 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:52:56.888 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:52:56.890 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:52:56.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:52:56.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:52:57.140 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:52:57.141 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:52:57.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:52:57.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:52:57.143 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:52:57.143 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:52:57.144 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:52:57.144 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:52:57.145 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:52:57.146 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:52:57.146 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:52:57.146 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:52:57.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:52:57.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:52:57.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:52:57.148 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:52:57.154 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:e2:ea:42:0e:0e:ef:18:f0:43:d4:84:e8:52:0d:3a:28:8f:8b:40] modulus: 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 public exponent: 10001 ] 2022-06-04 07:57:38.289 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 07:57:38.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 07:57:38.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:57:38.297 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 07:57:38.298 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 07:57:38.299 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 07:57:38.299 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 07:57:38.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 07:57:38.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 07:57:38.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 07:57:38.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 07:57:38.309 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:57:38.309 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 07:57:38.310 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:57:38.632 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 07:57:38.633 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 07:57:38.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 07:57:38.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 07:57:38.637 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 07:57:38.638 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 07:57:38.638 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:57:38.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:57:38.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:57:38.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:57:38.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:57:38.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:57:38.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 07:57:38.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 07:57:38.645 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 07:57:38.646 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 07:57:38.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:7f:ae:ae:d8:1a:51:22:f5:08:2a:4b:ea:50:f0:8c:5d:78:63:10] modulus: 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 public exponent: 10001 ] 2022-06-04 08:02:29.308 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:02:29.313 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:02:29.319 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:02:29.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:02:29.322 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:02:29.323 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:02:29.323 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:02:29.324 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:02:29.324 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:02:29.325 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:02:29.332 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:02:29.334 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:02:29.335 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:02:29.335 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:02:29.622 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:02:29.623 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:02:29.624 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:02:29.624 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:02:29.626 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:02:29.626 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:02:29.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:02:29.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:02:29.628 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:02:29.628 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:02:29.629 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:02:29.629 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:02:29.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:02:29.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:02:29.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:02:29.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:02:29.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:1d:18:8e:87:35:ab:18:60:39:b6:89:4b:54:d8:56:ba:ca:53:7f] modulus: 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 public exponent: 10001 ] 2022-06-04 08:07:18.892 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:07:18.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:07:18.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:07:18.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:07:18.904 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:07:18.905 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:07:18.906 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:07:18.906 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:07:18.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:07:18.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:07:18.915 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:07:18.917 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:07:18.918 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:07:18.919 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:07:19.116 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:07:19.117 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:07:19.118 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:07:19.118 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:07:19.120 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:07:19.121 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:07:19.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:07:19.122 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:07:19.122 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:07:19.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:07:19.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:07:19.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:07:19.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:07:19.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:07:19.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:07:19.126 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:07:19.131 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:58:f5:c9:ba:ca:f2:b6:4d:64:13:b9:db:48:20:27:f8:aa:a6:b7] modulus: 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 public exponent: 10001 ] 2022-06-04 08:16:19.285 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:16:19.288 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:16:19.291 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:16:19.293 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:16:19.294 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:16:19.294 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:16:19.295 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:16:19.295 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:16:19.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:16:19.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:16:19.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:16:19.304 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:16:19.305 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:16:19.305 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:16:19.592 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:16:19.593 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:16:19.593 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:16:19.594 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:16:19.595 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:16:19.596 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:16:19.596 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:16:19.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:16:19.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:16:19.598 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:16:19.598 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:16:19.599 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:16:19.599 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:16:19.600 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:16:19.600 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:16:19.601 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:16:19.606 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:b2:c2:a5:f9:6a:a9:c6:47:02:34:34:75:63:ad:bf:12:3a:e1:c0] modulus: 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 public exponent: 10001 ] 2022-06-04 08:21:39.718 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:21:39.721 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:21:39.723 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:21:39.725 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:21:39.726 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:21:39.727 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:21:39.728 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:21:39.729 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:21:39.730 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:21:39.730 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:21:39.744 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:21:39.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:21:39.746 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:21:39.746 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:21:40.013 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:21:40.014 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:21:40.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:21:40.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:21:40.016 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:21:40.016 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:21:40.016 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:21:40.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:21:40.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:21:40.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:21:40.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:21:40.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:21:40.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:21:40.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:21:40.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:21:40.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:21:40.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:ae:d0:94:58:da:ec:00:3d:3e:be:d6:8d:e1:8e:c2:fa:07:e8:53] modulus: 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 public exponent: 10001 ] 2022-06-04 08:31:19.719 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:31:19.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:31:19.735 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-04 08:31:19.738 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:31:19.739 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-04 08:31:19.741 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:31:19.741 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:31:19.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:31:19.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:31:19.744 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:31:19.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:31:19.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:31:19.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:31:19.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:31:20.014 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:31:20.014 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:31:20.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:31:20.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:31:20.016 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:31:20.017 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:31:20.017 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:31:20.017 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:31:20.018 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:31:20.018 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:31:20.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:31:20.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:31:20.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:31:20.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:31:20.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:31:20.021 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:31:20.033 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:cc:b1:8c:4a:7b:9b:27:dc:fb:f5:d6:16:51:31:bf:e8:6a:6d:49] modulus: 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 public exponent: 10001 ] 2022-06-04 08:31:48.669 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:31:48.672 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:31:48.675 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:31:48.676 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:31:48.677 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:31:48.678 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:31:48.678 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:31:48.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:31:48.679 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:31:48.679 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:31:48.685 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:31:48.686 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:31:48.686 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:31:48.687 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:31:48.848 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:31:48.849 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:31:48.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:31:48.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:31:48.851 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:31:48.852 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:31:48.852 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:31:48.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:31:48.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:31:48.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:31:48.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:31:48.855 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:31:48.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:31:48.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:31:48.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:31:48.867 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:31:48.871 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:cd:23:d8:7f:c8:70:9b:5b:fd:ab:3f:d0:6c:db:62:26:dc:80:15] modulus: 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 public exponent: 10001 ] 2022-06-04 08:36:27.413 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:36:27.417 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:36:27.420 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:36:27.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:36:27.422 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 08:36:27.422 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:36:27.423 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:36:27.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:36:27.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:36:27.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:36:27.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:36:27.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:36:27.435 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:36:27.436 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:36:27.676 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:36:27.678 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:36:27.678 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:36:27.679 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:36:27.681 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:36:27.682 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:36:27.682 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:36:27.683 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:36:27.683 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:36:27.685 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:36:27.685 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:36:27.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:36:27.687 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:36:27.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:36:27.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:36:27.689 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:36:27.694 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:73:fe:79:2c:af:b4:11:8a:d9:e1:cb:52:21:b8:f7:35:f8:af:7e] modulus: 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 public exponent: 10001 ] 2022-06-04 08:37:37.189 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:37:37.190 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:37:37.192 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-04 08:37:37.193 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:37:37.193 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-04 08:37:37.194 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:37:37.194 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:37:37.195 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:37:37.195 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:37:37.196 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:37:37.200 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:37:37.201 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:37:37.201 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:37:37.201 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:37:37.452 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:37:37.453 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:37:37.453 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:37:37.454 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:37:37.455 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:37:37.455 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:37:37.456 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:37:37.456 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:37:37.456 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:37:37.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:37:37.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:37:37.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:37:37.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:37:37.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:37:37.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:37:37.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:37:37.463 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:ba:3c:43:25:06:fe:02:67:ca:c5:7d:a0:1e:27:09:86:90:38:f2] modulus: db8aed7e47eee4e984c2239fe62420cdaadaeafa319daf25640ce4aab24c5668f2936a0558b99c8d16cd37f7dd7707c7019d9ed171f4c956d45f25a01825b5e51c1d058f3d3c8d52d84b858d0693996c9f65407b9327f67ac26db5826b66c51672fa4db8da05e252d8ff116721c778605ebcb120d3b38dc069b6dfb754331e6edce0329591f25723295ca1baa0d7aaed9d5c99d7df139a8de41a11fab81343622ed78a064a0fa49ece40f9ea94b17d3d33f9a0d0ef2908eb3f79aea0936c48b0beb953c2de213881555c6cc0620579a73fa53ab314c7cbf224a8ebedae88a988f59716de7cd760a4475567bb0b6e74c206f11a925a836f9b0da16cb3492860ad public exponent: 10001 ] 2022-06-04 08:37:54.858 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-04 08:37:54.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-04 08:37:54.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-04 08:37:54.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 08:37:54.862 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-04 08:37:54.863 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-04 08:37:54.863 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-04 08:37:54.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-04 08:37:54.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-04 08:37:54.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-04 08:37:54.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-04 08:37:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:37:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-04 08:37:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:37:55.074 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-04 08:37:55.075 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-04 08:37:55.075 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-04 08:37:55.076 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 08:37:55.077 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-04 08:37:55.077 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-04 08:37:55.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:37:55.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:37:55.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:37:55.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:37:55.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:37:55.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:37:55.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 08:37:55.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-04 08:37:55.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-04 08:37:55.082 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 08:37:55.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 533924570004274201443507593786056129650172523335 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 05:05:32 UTC 2022 Final Date: Thu Jun 03 05:05:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:d6:70:5f:e9:a9:88:b0:91:89:77:98:ed:a2:df:0d:0e:fd:78:cb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c50afd64e8aff70a22e641e2ef61b40766e8c65 fff735e3a16bf8752c33e62670180643786f6c85 ce1d79ac8ce5066359d55a31983194573a360862 e55b50b4ba7709c1c7f612be77f724da7d05a289 831e6f43ddfda1dc500ed86e9c12b6712b679006 62fe2dd8de172f3c01689f3d63c0bfaa5bb60c80 b0247411abd8ccc25891d806ede1aaee150d005a 4ef442c02ba9fa4802059e200d093f3c4c6ac48e 883bedd8ce0778a7d89814bade4324174d5faf1f cdf2f6c1f0419c34d7aa68c22c39f355926f79ec ee35c86e41606c2be99ed3fbe4ef3c2c380899b6 aaafc57bc8d8db33a6b05288e82edb5a3b1c8a1a 78920dc26ed42b71261f71b7e513745b54489c9b a619520b531b0062061152995ca7cf5280f8d401 133c197b66fa6d65387831c97d35e9619cd167de ad4f02a12b61d1d7023fc934c3b39036ff318abd a6a9a8d0b7621b56a1864ada8374658c7bf97d2c 97f54679541a4a02b6ce8d83c7e438b89e8cd2a5 5ac8cde6846f1e5d104030e0bacb108226f445ed 1147f459 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:04:04:e4:55:7b:0d:c0:cc:e7:f9:10:c9:5f:6c:a9:2b:ff:d6:3b] modulus: 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 public exponent: 10001 ]