By type
2022-06-05 05:14:58,755 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-05 05:15:00,536 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-05 05:15:01.737 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 05, 2022 5:15:04 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 05, 2022 5:15:04 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 05, 2022 5:15:04 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 05, 2022 5:15:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-05 05:15:05.333 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-05 05:15:05.714 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-05 05:15:05.976 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-05 05:15:07.211 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-05 05:15:07.215 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-05 05:15:07.217 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-05 05:15:07.222 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-05 05:15:07.274 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-05 05:15:07.280 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-05 05:15:07.432 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-05 05:15:08.343 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 05, 2022 5:15:09 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-05 05:15:09.582 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.89 seconds (JVM running for 13.822) Jun 05, 2022 5:15:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-05 05:15:48.624 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 05:15:48.640 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 05:15:48.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-05 05:15:48.713 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 05:15:48.742 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-05 05:15:48.747 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 05:15:48.749 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 05:15:48.751 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 05:15:48.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 05:15:48.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 05:15:48.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 05:15:48.777 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 05:15:48.843 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 05:15:48.852 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 05:15:48.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 05:15:48.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:15:49.497 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 05:15:49.507 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 05:15:49.509 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 05:15:49.514 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:15:49.528 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 05:15:49.530 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 05:15:49.531 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:15:49.532 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:15:49.532 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:15:49.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:15:49.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:15:49.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:15:49.560 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:15:49.561 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:15:49.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:15:49.564 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 05:15:49.611 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:c0:5b:10:b3:6f:26:d0:70:58:0f:35:c0:36:de:2a:e4:e0:c9:9e] modulus: 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 public exponent: 10001 ] 2022-06-05 06:54:23.374 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 06:54:23.377 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 06:54:23.381 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 06:54:23.383 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 06:54:23.384 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 06:54:23.385 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 06:54:23.386 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 06:54:23.386 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 06:54:23.387 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 06:54:23.388 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 06:54:23.401 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 06:54:23.402 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:54:23.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:54:23.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:54:23.580 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 06:54:23.581 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 06:54:23.582 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 06:54:23.582 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:54:23.586 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 06:54:23.587 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 06:54:23.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:54:23.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:54:23.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:54:23.590 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:54:23.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:54:23.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:54:23.593 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:54:23.594 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:54:23.594 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:54:23.596 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 06:54:23.603 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:03:06:eb:c3:e6:ae:bb:6f:5d:cb:6b:17:9a:17:de:ad:55:25:a8] modulus: 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 public exponent: 10001 ] 2022-06-05 06:56:11.687 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 06:56:11.688 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 06:56:11.690 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-05 06:56:11.691 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 06:56:11.692 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-05 06:56:11.693 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 06:56:11.693 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 06:56:11.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 06:56:11.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 06:56:11.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 06:56:11.703 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 06:56:11.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:56:11.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:56:11.705 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:56:11.857 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 06:56:11.858 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 06:56:11.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 06:56:11.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:56:11.862 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 06:56:11.862 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 06:56:11.863 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:56:11.863 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:56:11.864 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:56:11.865 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:56:11.865 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:56:11.866 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:56:11.867 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:56:11.867 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:56:11.868 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:56:11.869 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 06:56:11.874 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:34:ed:89:e0:49:77:74:8c:fb:cd:0b:51:3a:90:f4:30:ef:ac:40] modulus: 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 public exponent: 10001 ] 2022-06-05 06:57:35.940 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 06:57:35.942 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 06:57:35.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-05 06:57:35.953 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 06:57:35.953 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-05 06:57:35.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 06:57:35.955 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 06:57:35.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 06:57:35.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 06:57:35.957 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 06:57:35.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 06:57:35.969 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:57:35.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:57:35.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:57:36.123 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 06:57:36.125 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 06:57:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 06:57:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:57:36.128 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 06:57:36.129 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 06:57:36.130 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:57:36.131 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:57:36.131 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:57:36.132 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:57:36.133 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:57:36.134 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:57:36.135 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:57:36.136 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:57:36.137 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:57:36.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 06:57:36.150 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:f1:ce:80:5c:74:45:0c:d2:72:11:f6:d1:ed:46:11:aa:06:a8:3e] modulus: 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 public exponent: 10001 ] 2022-06-05 06:59:42.923 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 06:59:42.925 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 06:59:42.927 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 06:59:42.930 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 06:59:42.930 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 06:59:42.931 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 06:59:42.931 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 06:59:42.932 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 06:59:42.932 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 06:59:42.933 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 06:59:42.938 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 06:59:42.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:59:42.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 06:59:42.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:59:43.099 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 06:59:43.100 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 06:59:43.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 06:59:43.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 06:59:43.104 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 06:59:43.105 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 06:59:43.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:59:43.108 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:59:43.109 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:59:43.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:59:43.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:59:43.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:59:43.112 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 06:59:43.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 06:59:43.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 06:59:43.115 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 06:59:43.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:3d:df:fe:34:fd:3d:ba:46:da:6d:4b:77:32:5f:19:c5:1f:5e:b5] modulus: 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 public exponent: 10001 ] 2022-06-05 07:03:12.320 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:03:12.324 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:03:12.327 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:03:12.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:03:12.329 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:03:12.331 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:03:12.331 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:03:12.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:03:12.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:03:12.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:03:12.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:03:12.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:03:12.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:03:12.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:03:12.483 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:03:12.484 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:03:12.484 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:03:12.484 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:03:12.486 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:03:12.487 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:03:12.487 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:03:12.488 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:03:12.489 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:03:12.490 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:03:12.490 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:03:12.491 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:03:12.492 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:03:12.493 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:03:12.493 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:03:12.494 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:03:12.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:38:1d:7f:d4:a3:61:98:1b:ff:12:46:70:67:a9:ce:81:88:f5:ff] modulus: ba8d118622232a016a72df3c14da6c54cb65087000f06e19cd3a4e3bd1df70ad96611f03f2eb5256987fefd8862663819edbb24bdd39bed9e97ab751cbc929c6a2a12056515b0b553d31eea20f12752289dc3ca94d22bdd415c7d79d8f9d828f7db913527ac1498bbffeb4ec1990554ebb616fee0e0c33de15d62a888cd048118c75faa3988fd6165fc3d34df132eaef6f2aa5368ec8a397f65fce6e0602aaaba6ae7a23c2277d5b31645f5283946735782c69f96c1e81202021aa1c7373ae45310c72c05a9d27f1bab46b336175266f3692381318830687348bf53de948f36f433ac3ae3b9be22ed2b5ea6f6eff90fa5c05714631e9c585de755e7a166166b5 public exponent: 10001 ] 2022-06-05 07:06:48.162 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:06:48.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:06:48.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:06:48.167 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:06:48.168 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:06:48.169 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:06:48.170 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:06:48.170 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:06:48.171 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:06:48.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:06:48.194 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:06:48.195 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:06:48.195 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:06:48.196 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:06:48.345 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:06:48.346 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:06:48.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:06:48.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:06:48.349 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:06:48.349 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:06:48.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:06:48.350 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:06:48.350 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:06:48.351 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:06:48.351 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:06:48.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:06:48.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:06:48.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:06:48.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:06:48.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:06:48.358 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:b0:1d:62:e9:a8:2c:c3:da:bf:88:d9:d4:90:d6:30:ea:5b:82:d1] modulus: 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 public exponent: 10001 ] 2022-06-05 07:08:47.304 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:08:47.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:08:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:08:47.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:08:47.313 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:08:47.314 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:08:47.314 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:08:47.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:08:47.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:08:47.317 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:08:47.323 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:08:47.326 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:08:47.326 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:08:47.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:08:47.473 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:08:47.475 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:08:47.476 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:08:47.477 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:08:47.483 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:08:47.485 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:08:47.486 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:08:47.487 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:08:47.488 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:08:47.490 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:08:47.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:08:47.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:08:47.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:08:47.493 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:08:47.493 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:08:47.494 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:08:47.501 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:ae:32:73:51:66:61:b7:ff:52:ed:b5:12:a9:ef:fb:a5:3a:66:44] modulus: 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 public exponent: 10001 ] 2022-06-05 07:11:09.034 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:11:09.035 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:11:09.038 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:11:09.039 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:11:09.039 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:11:09.040 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:11:09.041 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:11:09.041 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:11:09.042 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:11:09.042 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:11:09.047 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:11:09.048 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:11:09.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:11:09.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:11:09.192 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:11:09.193 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:11:09.194 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:11:09.194 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:11:09.196 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:11:09.197 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:11:09.198 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:11:09.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:11:09.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:11:09.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:11:09.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:11:09.205 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:11:09.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:11:09.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:11:09.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:11:09.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:11:09.219 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:38:d5:5c:0e:6d:47:18:7a:18:c3:90:dc:e0:e6:3d:00:0d:c1:05] modulus: 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 public exponent: 10001 ] 2022-06-05 07:12:47.475 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:12:47.481 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:12:47.485 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-05 07:12:47.486 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:12:47.486 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-05 07:12:47.487 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:12:47.489 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:12:47.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:12:47.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:12:47.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:12:47.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:12:47.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:12:47.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:12:47.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:12:47.652 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:12:47.653 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:12:47.653 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:12:47.653 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:12:47.656 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:12:47.656 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:12:47.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:12:47.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:12:47.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:12:47.658 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:12:47.659 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:12:47.659 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:12:47.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:12:47.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:12:47.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:12:47.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:12:47.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: a005652bc20550879063fdce80cda2ad9d7638e63be7f24ba582f09f9c1987d5734ed6efd1f8331027e53b768d58a5d09340ef15bcf754a0bdd83a87fdc581bf05119a59fbd70c2a86ce2849ac68617fd2bacb74dd37ae26ec19bd6461deb1a8b987f7a6313417a00b1402dd2b49545a3753e5afabfe6edd58df46cd7d187d9994bf59854a7633a25835f8b8f3d80807e886510066946a9311a912579f91ab4cfca8525cbe24d5a6255def89f76f0aeb4a78cf207b92eee9b1d377bfe416cc4b763565bb4f70190c69ee3721bc5177eb5504eda5f85bfdf612fa1f8047b3aabc684ab57c17031dffe294df487142e93cfe249cb034c41434b63c1382abe4c82a7ef3d0aa854d30133d640d9e7176685b896ba90cf08166eaa22c3e536cc94d73b417af149d5eed15befb8e48e15a25dc24084f2d65f2022c557b7235af8b0dc9edf461b56c9be467d3a776174d504bf4c1dacc39ea253b8c6425374844412a41f86d4e92e70af807a337ec8d67a7f8b71a650c09feccaf3d6687d9d8fb87d5f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:b2:9e:91:a8:d8:c8:1d:55:1d:68:e2:42:1f:04:5d:78:f2:50:12] modulus: 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 public exponent: 10001 ] 2022-06-05 07:15:09.743 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:15:09.746 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:15:09.749 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:15:09.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:15:09.750 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:15:09.751 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:15:09.752 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:15:09.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:15:09.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:15:09.753 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:15:09.759 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:15:09.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:15:09.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:15:09.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:15:09.911 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:15:09.912 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:15:09.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:15:09.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:15:09.914 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:15:09.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:15:09.915 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:15:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:15:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:15:09.917 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:15:09.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:15:09.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:15:09.919 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:15:09.919 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:15:09.919 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:15:09.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:15:09.939 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:ef:0a:1b:fe:45:2a:7e:68:8f:ca:26:e7:dd:64:ec:2c:ce:aa:54] modulus: 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 public exponent: 10001 ] 2022-06-05 07:17:46.817 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:17:46.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:17:46.826 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-05 07:17:46.828 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:17:46.829 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-05 07:17:46.829 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:17:46.830 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:17:46.831 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:17:46.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:17:46.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:17:46.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:17:46.841 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:17:46.842 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:17:46.842 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:17:46.986 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:17:46.987 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:17:46.987 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:17:46.987 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:17:46.989 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:17:46.990 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:17:46.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:17:46.991 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:17:46.991 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:17:46.992 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:17:46.992 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:17:46.993 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:17:46.993 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:17:46.994 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:17:46.994 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:17:46.995 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:17:47.002 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:6b:d2:30:5c:5a:d2:54:80:88:81:b0:ba:c2:1d:5e:e2:de:d3:bf] modulus: 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 public exponent: 10001 ] 2022-06-05 07:18:03.723 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:18:03.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:18:03.726 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-05 07:18:03.726 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:18:03.727 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-05 07:18:03.728 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:18:03.728 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:18:03.729 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:18:03.729 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:18:03.730 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:18:03.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:18:03.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:18:03.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:18:03.739 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:18:03.863 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:18:03.865 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:18:03.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:18:03.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:18:03.870 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:18:03.871 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:18:03.871 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:18:03.872 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:18:03.872 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:18:03.873 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:18:03.873 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:18:03.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:18:03.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:18:03.875 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:18:03.875 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:18:03.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:18:03.881 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:34:c1:eb:e1:e2:4f:1d:92:0c:c1:00:c1:83:03:29:69:a3:5e:e6] modulus: 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 public exponent: 10001 ] 2022-06-05 07:20:30.052 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:20:30.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:20:30.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:20:30.058 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:20:30.059 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:20:30.060 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:20:30.060 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:20:30.061 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:20:30.061 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:20:30.062 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:20:30.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:20:30.070 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:20:30.070 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:20:30.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:20:30.215 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:20:30.217 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:20:30.217 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:20:30.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:20:30.219 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:20:30.220 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:20:30.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:20:30.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:20:30.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:20:30.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:20:30.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:20:30.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:20:30.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:20:30.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:20:30.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:20:30.224 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:20:30.230 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:49:58:70:88:08:fc:48:50:64:8f:74:db:80:a2:13:13:ac:15:e0] modulus: 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 public exponent: 10001 ] 2022-06-05 07:24:32.038 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:24:32.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:24:32.045 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:24:32.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:24:32.050 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:24:32.051 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:24:32.051 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:24:32.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:24:32.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:24:32.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:24:32.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:24:32.061 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:24:32.061 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:24:32.062 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:24:32.197 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:24:32.198 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:24:32.199 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:24:32.199 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:24:32.201 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:24:32.201 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:24:32.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:24:32.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:24:32.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:24:32.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:24:32.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:24:32.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:24:32.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:24:32.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:24:32.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:24:32.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:24:32.231 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:ca:0b:e5:8c:21:21:7e:95:3c:ef:85:9e:4d:d3:9c:1b:2a:5a:2a] modulus: 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 public exponent: 10001 ] 2022-06-05 07:33:25.180 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:33:25.183 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:33:25.186 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:33:25.188 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:33:25.189 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:33:25.190 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:33:25.190 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:33:25.191 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:33:25.192 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:33:25.193 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:33:25.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:33:25.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:33:25.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:33:25.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:33:25.406 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:33:25.407 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:33:25.407 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:33:25.407 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:33:25.409 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:33:25.409 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:33:25.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:33:25.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:33:25.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:33:25.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:33:25.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:33:25.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:33:25.412 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:33:25.412 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:33:25.413 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:33:25.414 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:33:25.418 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:4b:24:a7:8c:b1:09:d7:39:c7:e7:e1:f7:46:28:1c:6d:ab:79:9c] modulus: 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 public exponent: 10001 ] 2022-06-05 07:37:24.710 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:37:24.713 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:37:24.714 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:37:24.718 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:37:24.719 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:37:24.722 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:37:24.722 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:37:24.723 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:37:24.723 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:37:24.723 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:37:24.729 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:37:24.729 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:37:24.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:37:24.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:37:24.870 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:37:24.873 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:37:24.873 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:37:24.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:37:24.877 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:37:24.877 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:37:24.878 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:37:24.878 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:37:24.879 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:37:24.879 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:37:24.880 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:37:24.880 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:37:24.881 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:37:24.881 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:37:24.881 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:37:24.882 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:37:24.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:12:ed:6a:8a:6f:ba:1e:36:9f:9e:b1:f2:e3:48:9c:61:12:18:60] modulus: c56cf4de6aa5ac031313e9cb0413ff901c03c359a9d134b3b79dd0ae1be58a32a583c6936211fca009ce2f2b174877a9ae4bf9eaf4f7cb2224c75333397645cc315b867c1aeae3b2c0ac48295efdf56d3d613e024dcb7b0d5dce9a023ca7ac2e89c9a0d72eb23a190ea9fb01f09e70304301bca927561e683124c50d0de3c5fec01036df6343a3b4f237f58c58dc383f2fd4dd42e29342390dc846f86500a0c1bdcc59b88e5cc092ada9fd3bda7db41e5645e81deb9b8f67561717fed70de399279a98bf1865af5749c26f8f8854e9aebf67c7aa9786dbf8b78437605420ce9fe22586f75af08b3e497fc0a16371cfd73bde34e7c7437806ff58f995671f1d63 public exponent: 10001 ] 2022-06-05 07:46:56.080 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-05 07:46:56.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-05 07:46:56.087 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:46:56.089 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 07:46:56.089 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 07:46:56.090 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-05 07:46:56.091 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-05 07:46:56.091 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-05 07:46:56.092 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-05 07:46:56.093 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-05 07:46:56.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-05 07:46:56.105 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:46:56.106 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-05 07:46:56.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:46:56.276 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-05 07:46:56.277 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-05 07:46:56.277 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-05 07:46:56.278 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 07:46:56.279 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-05 07:46:56.280 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-05 07:46:56.280 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:46:56.281 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:46:56.281 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:46:56.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:46:56.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:46:56.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:46:56.284 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 07:46:56.285 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-05 07:46:56.286 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-05 07:46:56.287 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 07:46:56.292 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 497174122579986714430804203936092056190921329452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 05:12:52 UTC 2022 Final Date: Fri Jun 04 05:12:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:8e:18:38:1c:30:97:7d:d5:cb:bc:7f:25:2a:37:5f:13:6d:13:c5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5fdfc11cf089c4a05527b3b747c00a1404fadaae 875040a01a01732fbc74161b4c36fff773d2ba35 376f926e8c208dd67901fe0415f9f912c1e5df6c 16ea7758da1a686536f3d8b26cecb6aa04ed761c dbb174933cd9df45c3b5d48419b170e5af442699 730d9e137923b1b699431873dc47f6b6be23df4d a7106aac2bbd0d86f9091af719d523c207befea0 3fd64093e5ea4fe527bd4dae588a7e81c7841274 b59db69ea6178ec7f0d1436a917244436c3cd86f cdd19db9271787cfcfcbb69bd31b811b10c0ad90 8ccd1bfae945e5b92720e453c632ef034b8c1d93 6a33ed9b89d55607cf41734982a6655e483decb4 9cd1061e2c3ac041e3b5d1e3355404114dd9a48b 4e64cb6fd3958a30c4a8a4369090057234777e8c 567f8a14ab6d41d69d5dbb0f2c6515e7658b758f a30979305929c5f9e0d9206a654d40850202ee6d 6e9d959bbe7a34d420d021805475062d2be2e840 9f11ba2f4258b8908fe06e28fa43e060cb76ee10 21722d4c9309ed8d00a4b58e176a567aeca96264 a76b84c8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:a4:b6:f7:b9:2e:fc:a7:01:77:a9:fa:c5:ca:fa:3c:c4:ec:a7:7c] modulus: 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 public exponent: 10001 ]