By type
2022-06-08 05:18:46,498 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-08 05:18:47,374 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-08 05:18:48.175 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 08, 2022 5:18:50 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 08, 2022 5:18:50 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 08, 2022 5:18:50 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 08, 2022 5:18:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-08 05:18:50.823 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-08 05:18:51.132 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-08 05:18:51.317 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-08 05:18:52.042 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-08 05:18:52.045 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-08 05:18:52.046 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-08 05:18:52.050 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-08 05:18:52.092 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-08 05:18:52.095 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-08 05:18:52.233 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-08 05:18:52.975 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 08, 2022 5:18:53 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-08 05:18:53.874 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.213 seconds (JVM running for 10.215) Jun 08, 2022 5:19:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-08 05:19:26.437 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 05:19:26.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 05:19:26.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-08 05:19:26.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 05:19:26.507 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-08 05:19:26.510 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 05:19:26.511 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 05:19:26.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 05:19:26.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 05:19:26.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 05:19:26.524 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 05:19:26.530 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 05:19:26.581 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 05:19:26.586 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 05:19:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 05:19:26.591 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 05:19:27.234 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 05:19:27.237 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 05:19:27.237 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 05:19:27.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 05:19:27.255 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 05:19:27.257 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 05:19:27.258 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 05:19:27.259 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 05:19:27.260 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 05:19:27.274 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 05:19:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 05:19:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 05:19:27.282 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 05:19:27.282 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 05:19:27.283 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 05:19:27.285 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 05:19:27.313 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: ac5ca0fd7ec0d3d9c2732f3c9b8cc73e9af638d00249f9d08abeacfaf0502a8598f0f73dd50dd6c6b5d50b6ac94fbc396225261905a5f81af7670c4add2ebf1bbc2bf84d6cc6270d2a71a6ee13903fb568fda1ed5f57c74f4f9bfcc6004a0fbe59c4cfe2a225c815cb4f7f3e1e1ad6b4d5823cc8a49f6465f7c523e7483cfc265eed47046665b285bbc166193ca1501cd8ae292441abbdf6d217a22345334dfea960186c9072e7432daa099f89ec073c55cc7651a6678b92bfee120a4f00e8b1f3972b8cf17eede476143336aebabab03cb20a0fc29385f7527f240aa444a8751b1f008680b599c35561df2c34cff384533c5e337fbe27261daa13aabda5a25b92a1bd79deaf798a8965d84f79aeeabcce98ac0419b71f008b5c364cc7ca8ccf97a678622f3d965597fc2b7d2a61037094984b7ecaf1b0a74274aa589937659f7913fa72c011a3fef3c41be4c108c67ec77a19de3dc656ec0717d54a34aa88dd0173a1b36df611039b0b4ce3b31a4c2d0282ada4aa81e6e2d930d582a96c6e65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:e5:24:d5:6b:22:a2:e8:d5:f7:0a:20:06:32:29:d2:9e:8b:a3:57] modulus: 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 public exponent: 10001 ] 2022-06-08 06:39:52.265 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:39:52.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:39:52.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:39:52.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:39:52.278 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:39:52.279 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:39:52.279 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:39:52.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:39:52.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:39:52.281 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:39:52.289 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:39:52.290 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:39:52.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:39:52.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:39:52.721 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:39:52.725 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:39:52.725 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:39:52.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:39:52.730 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:39:52.733 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:39:52.735 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:39:52.737 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:39:52.738 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:39:52.739 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:39:52.742 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:39:52.742 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:39:52.743 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:39:52.744 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:39:52.744 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:39:52.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:39:52.755 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:0a:a8:4d:b5:e1:04:87:05:77:43:88:95:a4:32:00:cd:cd:d7:46] modulus: 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 public exponent: 10001 ] 2022-06-08 06:41:33.109 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:41:33.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:41:33.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-08 06:41:33.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:41:33.113 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-08 06:41:33.114 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:41:33.115 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:41:33.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:41:33.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:41:33.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:41:33.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:41:33.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:41:33.127 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:41:33.127 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:41:33.334 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:41:33.335 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:41:33.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:41:33.337 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:41:33.339 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:41:33.339 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:41:33.340 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:41:33.340 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:41:33.341 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:41:33.342 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:41:33.342 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:41:33.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:41:33.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:41:33.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:41:33.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:41:33.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:41:33.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: ac5ca0fd7ec0d3d9c2732f3c9b8cc73e9af638d00249f9d08abeacfaf0502a8598f0f73dd50dd6c6b5d50b6ac94fbc396225261905a5f81af7670c4add2ebf1bbc2bf84d6cc6270d2a71a6ee13903fb568fda1ed5f57c74f4f9bfcc6004a0fbe59c4cfe2a225c815cb4f7f3e1e1ad6b4d5823cc8a49f6465f7c523e7483cfc265eed47046665b285bbc166193ca1501cd8ae292441abbdf6d217a22345334dfea960186c9072e7432daa099f89ec073c55cc7651a6678b92bfee120a4f00e8b1f3972b8cf17eede476143336aebabab03cb20a0fc29385f7527f240aa444a8751b1f008680b599c35561df2c34cff384533c5e337fbe27261daa13aabda5a25b92a1bd79deaf798a8965d84f79aeeabcce98ac0419b71f008b5c364cc7ca8ccf97a678622f3d965597fc2b7d2a61037094984b7ecaf1b0a74274aa589937659f7913fa72c011a3fef3c41be4c108c67ec77a19de3dc656ec0717d54a34aa88dd0173a1b36df611039b0b4ce3b31a4c2d0282ada4aa81e6e2d930d582a96c6e65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:ed:91:16:f7:9a:c0:67:ec:3f:62:e7:c1:4d:c1:a4:6b:99:fe:ae] modulus: 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 public exponent: 10001 ] 2022-06-08 06:43:03.679 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:43:03.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:43:03.686 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-08 06:43:03.687 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:43:03.689 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-08 06:43:03.690 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:43:03.690 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:43:03.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:43:03.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:43:03.692 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:43:03.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:43:03.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:43:03.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:43:03.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:43:04.008 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:43:04.010 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:43:04.011 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:43:04.011 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:43:04.013 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:43:04.013 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:43:04.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:43:04.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:43:04.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:43:04.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:43:04.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:43:04.017 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:43:04.017 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:43:04.018 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:43:04.018 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:43:04.019 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:43:04.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:ee:7b:fd:44:9b:5e:08:5c:85:34:16:fd:6a:b9:e2:2b:c6:57:ec] modulus: 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 public exponent: 10001 ] 2022-06-08 06:45:23.535 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:45:23.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:45:23.539 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:45:23.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:45:23.540 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:45:23.542 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:45:23.542 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:45:23.543 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:45:23.543 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:45:23.544 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:45:23.549 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:45:23.550 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:45:23.550 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:45:23.551 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:45:23.723 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:45:23.724 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:45:23.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:45:23.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:45:23.729 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:45:23.730 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:45:23.734 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:45:23.734 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:45:23.734 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:45:23.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:45:23.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:45:23.737 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:45:23.738 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:45:23.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:45:23.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:45:23.740 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:45:23.745 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:03:a7:9c:bd:14:d1:11:8a:bf:43:21:e1:50:56:ef:da:ce:0f:fb] modulus: 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 public exponent: 10001 ] 2022-06-08 06:49:26.370 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:49:26.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:49:26.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:49:26.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:49:26.374 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:49:26.375 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:49:26.375 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:49:26.375 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:49:26.376 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:49:26.376 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:49:26.382 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:49:26.382 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:49:26.382 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:49:26.383 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:49:26.582 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:49:26.583 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:49:26.583 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:49:26.584 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:49:26.585 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:49:26.586 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:49:26.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:49:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:49:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:49:26.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:49:26.589 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:49:26.589 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:49:26.590 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:49:26.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:49:26.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:49:26.593 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:49:26.597 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:06:d3:37:73:a8:c2:4d:5c:0a:22:8c:df:ee:0b:00:48:20:d1:fa] modulus: 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 public exponent: 10001 ] 2022-06-08 06:55:02.587 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:55:02.589 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:55:02.591 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:55:02.592 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:55:02.592 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:55:02.593 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:55:02.593 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:55:02.594 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:55:02.594 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:55:02.595 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:55:02.600 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:55:02.601 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:55:02.601 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:55:02.601 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:55:02.780 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:55:02.781 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:55:02.781 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:55:02.782 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:55:02.783 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:55:02.784 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:55:02.784 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:55:02.785 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:55:02.785 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:55:02.786 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:55:02.786 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:55:02.787 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:55:02.788 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:55:02.788 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:55:02.788 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:55:02.789 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:55:02.793 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:24:9b:ff:0a:b1:e6:70:32:f1:8b:3c:4e:29:98:69:79:d3:58:62] modulus: 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 public exponent: 10001 ] 2022-06-08 06:58:13.509 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:58:13.512 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:58:13.514 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-08 06:58:13.517 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:58:13.518 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-08 06:58:13.522 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:58:13.523 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:58:13.523 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:58:13.524 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:58:13.524 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:58:13.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:58:13.536 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:58:13.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:58:13.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:58:13.791 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:58:13.792 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:58:13.793 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:58:13.793 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:58:13.795 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:58:13.795 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:58:13.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:58:13.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:58:13.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:58:13.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:58:13.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:58:13.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:58:13.799 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:58:13.799 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:58:13.799 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:58:13.800 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:58:13.805 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:a8:37:69:b4:5b:6a:87:6c:79:bf:e1:ed:b4:f0:97:ac:72:89:b5] modulus: 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 public exponent: 10001 ] 2022-06-08 06:59:35.857 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 06:59:35.858 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 06:59:35.859 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:59:35.860 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 06:59:35.860 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 06:59:35.861 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 06:59:35.861 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 06:59:35.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 06:59:35.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 06:59:35.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 06:59:35.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 06:59:35.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:59:35.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 06:59:35.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:59:36.112 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 06:59:36.113 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 06:59:36.113 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 06:59:36.113 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 06:59:36.115 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 06:59:36.116 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 06:59:36.117 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:59:36.117 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:59:36.117 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:59:36.118 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:59:36.119 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:59:36.119 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:59:36.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 06:59:36.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 06:59:36.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 06:59:36.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 06:59:36.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:0a:09:89:24:c9:7e:81:3d:4b:22:b3:ea:b2:18:0e:a6:7c:85:55] modulus: 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 public exponent: 10001 ] 2022-06-08 07:03:51.442 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:03:51.446 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:03:51.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:03:51.449 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:03:51.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:03:51.450 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:03:51.450 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:03:51.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:03:51.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:03:51.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:03:51.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:03:51.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:03:51.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:03:51.458 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:03:51.694 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:03:51.695 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:03:51.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:03:51.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:03:51.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:03:51.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:03:51.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:03:51.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:03:51.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:03:51.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:03:51.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:03:51.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:03:51.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:03:51.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:03:51.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:03:51.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:03:51.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:34:c1:a5:24:58:1d:0e:f2:85:5e:d0:ad:2f:f6:45:00:02:5a:ce] modulus: ddd03b290dc452b5e1e33499d37f024b7e7c548a695ac86a979138edfbcdff99a087abf89dbc8304cc62523e38d28a5319f62e5725ca58a0b76f93a4cb118b5ea45e9043fb1c0ce8ed65c1a57084f65781baf5e58638cac72954ba5414b665f8c6ed3d2e0df58c71584d69eaee869c4696d30dcf402ec59f8a1308df49e213a36b21d8ec14b2b78f3a6373467f79ff362e3de212a278557061908d764f285a53d5079c17a1a0bccb427c6d688ad08a044ca4dd22382f3f77e323e25ba36623708d136da998557739f1ec246934bad784db4212054e13cafa6116bff1b71818210eb6c44769bd6714376b1ec24921102525b53da14fe263a1b28993efc7642df5 public exponent: 10001 ] 2022-06-08 07:05:05.318 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:05:05.319 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:05:05.321 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-08 07:05:05.322 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:05:05.322 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-08 07:05:05.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:05:05.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:05:05.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:05:05.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:05:05.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:05:05.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:05:05.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:05:05.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:05:05.331 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:05:05.519 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:05:05.520 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:05:05.520 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:05:05.521 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:05:05.523 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:05:05.523 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:05:05.524 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:05:05.524 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:05:05.524 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:05:05.525 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:05:05.525 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:05:05.526 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:05:05.529 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:05:05.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:05:05.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:05:05.531 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:05:05.537 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:0a:6f:8e:4a:80:25:97:6c:04:64:f5:44:6c:d9:9f:bd:84:bb:41] modulus: bfb9705d628e3609998ffbc0040545be34503c0fad1b3d5c47011d57301cdb5175a2283b9c0a25a88765c55b3c0a6c504470f3eee6cc313ab783ae823afa3e841a43cf2f16e14155a512af67bbfdd44c3feb6e23ca312c25a1aa2827fbada81736a6d3d9c01abe90b27c8a511c5bdbcaaa60b13d66f8e9b4a61ce4cf855c9fcbfeaad48798fecea8976611e327afb990f2491d229e81a37e8005a8b039fa6628276ee1606ef787ae132c727c40d1933f65debd3c1159d5d3e53099e315fd7e1da43ccdb240548fb34df0fc179a726708702acf09997099d1a55f4eb1d3cee54d95b6417f6675931b53110fc0494220c5454cfff41ec96f34d52ec4b66059fe3d public exponent: 10001 ] 2022-06-08 07:05:26.583 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:05:26.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:05:26.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-08 07:05:26.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:05:26.586 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-08 07:05:26.586 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:05:26.587 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:05:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:05:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:05:26.588 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:05:26.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:05:26.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:05:26.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:05:26.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:05:26.768 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:05:26.769 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:05:26.770 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:05:26.770 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:05:26.771 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:05:26.772 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:05:26.772 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:05:26.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:05:26.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:05:26.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:05:26.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:05:26.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:05:26.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:05:26.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:05:26.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:05:26.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:05:26.780 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:56:87:17:5e:1d:2d:8f:da:db:85:ed:d2:79:75:99:d6:6f:84:01] modulus: f106d0b329e4e683b30350d1a36840f674022df28b17afa030cf37874bf4c71bbde791ef96cc3ce81352bfbb7f89f95e6bf55a55fe835d72998116954f77c792c9efce524090a12a1ad4dbc46699e8806d437557ca3cdacbeadfd82e92dbefd3f441d9515a8360a773e7b046db762a630087aa7ddea17408994447203312869806c610a08d93b9874f427525127636db740ad60e5f9a70155492a8df8391d44a17f335c3dd94a86bf96e6775781b8ccb4811435966b73f3e89055d00a85ccfce0ef720bc91aec4fdcd3abef099c3b3b57841edccc2956b180c12b7d19c3caa117f41d02ff484c8f69baf8fa97113da173f9db30849bdf30fa947ec7f53d9457b public exponent: 10001 ] 2022-06-08 07:08:46.306 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:08:46.307 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:08:46.308 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:08:46.309 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:08:46.309 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:08:46.310 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:08:46.310 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:08:46.311 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:08:46.311 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:08:46.312 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:08:46.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:08:46.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:08:46.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:08:46.318 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:08:46.490 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:08:46.491 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:08:46.491 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:08:46.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:08:46.493 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:08:46.494 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:08:46.494 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:08:46.495 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:08:46.495 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:08:46.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:08:46.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:08:46.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:08:46.497 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:08:46.497 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:08:46.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:08:46.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:08:46.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:63:b5:28:59:7d:7c:c2:47:24:75:e1:99:fc:c4:5d:6c:fc:35:4c] modulus: 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 public exponent: 10001 ] 2022-06-08 07:12:39.422 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:12:39.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:12:39.425 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:12:39.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:12:39.427 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:12:39.427 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:12:39.428 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:12:39.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:12:39.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:12:39.429 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:12:39.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:12:39.434 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:12:39.434 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:12:39.435 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:12:39.565 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:12:39.566 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:12:39.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:12:39.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:12:39.568 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:12:39.568 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:12:39.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:12:39.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:12:39.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:12:39.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:12:39.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:12:39.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:12:39.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:12:39.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:12:39.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:12:39.572 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:12:39.575 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:e3:89:9d:b5:9a:33:dc:d6:b1:cb:4e:6c:76:fb:3b:e1:9e:40:e2] modulus: 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 public exponent: 10001 ] 2022-06-08 07:16:51.435 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:16:51.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:16:51.438 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:16:51.441 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:16:51.443 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:16:51.444 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:16:51.444 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:16:51.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:16:51.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:16:51.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:16:51.450 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:16:51.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:16:51.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:16:51.452 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:16:51.670 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:16:51.671 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:16:51.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:16:51.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:16:51.672 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:16:51.673 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:16:51.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:16:51.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:16:51.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:16:51.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:16:51.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:16:51.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:16:51.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:16:51.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:16:51.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:16:51.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:16:51.683 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 567731681149459590001794078633488790072177539628 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 05:16:16 UTC 2022 Final Date: Mon Jun 07 05:16:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [95:94:25:bf:aa:01:67:a8:6c:93:dc:85:5b:b7:3d:64:4d:a6:84:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01451409e0ca63ee93cc9afef33abaa0aa0a1a2c a881be3a5fb2f6574d95bddf35d9a77759bdd49d 01b5f240c4b56ac22f52888f9b5dbdb7c5cc1f0f c0581ef7ad47d118e0c9b1ea48a4a2fb6018efbb 2c83b86335eb0b612a80d74acd713bec13090ccb aa898da748e9352dea217e345886a56c4208e1f5 3d5349ee8d72ed27d7a477cf7908e41066e377d2 5195bfe6ddd29b130c97d95bdac1b6dd7277a597 9ba8e7cb5259f5a27a92d5635f79cd9b1afae3b3 0364fc939368f9fc2660dcbc82a4770dcd82bd31 a4b3a0508d8e2afb0de61ae5cdbbb65f5ff84ce9 279b2617fc0c984291de5792434bb6ac0b17f549 b713ee8a32cf9f15e0285990dd826e001037a19f 34933eaf6276aa10964ea0562c1fe6e280e179a7 671589f2219e5a19da4a6d33c8b4b1ac8b7b0c75 c2cda02749faf8aa985778cc3b1e720d461f9bde 124aea2efbc7c73fd2cfbde0193d5ae4d4887c16 91260942b2360142eef1d3b7befecac0251632fc 5e3540188565c2654fbd072b1c3359620f8a6005 44b46a72 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:ae:7a:f6:d2:b2:e1:39:c7:87:fb:01:65:22:ec:79:69:08:0c:40] modulus: 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 public exponent: 10001 ]