By type
2022-06-10 05:28:24,603 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-10 05:28:28,189 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-10 05:28:30.176 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 10, 2022 5:28:35 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 10, 2022 5:28:35 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 10, 2022 5:28:35 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 10, 2022 5:28:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-10 05:28:36.618 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-10 05:28:37.147 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-10 05:28:37.570 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-10 05:28:39.280 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-10 05:28:39.285 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-10 05:28:39.288 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-10 05:28:39.297 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-10 05:28:39.388 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-10 05:28:39.403 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-10 05:28:39.748 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-10 05:28:41.476 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 10, 2022 5:28:42 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-10 05:28:43.527 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 26.423 seconds (JVM running for 37.278) Jun 10, 2022 5:28:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-10 07:30:05.352 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:30:05.368 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:30:05.432 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:30:05.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:30:05.470 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:30:05.474 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:30:05.476 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:30:05.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:30:05.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:30:05.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:30:05.502 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:30:05.509 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:30:05.565 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:30:05.573 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:30:05.574 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:30:05.580 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:30:06.574 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:30:06.581 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:30:06.581 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:30:06.584 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:30:06.596 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:30:06.598 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:30:06.599 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:30:06.599 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:30:06.600 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:30:06.619 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:30:06.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:30:06.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:30:06.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:30:06.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:30:06.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:30:06.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:30:06.666 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:1a:cc:da:e1:a1:1c:90:df:a2:0b:63:68:1a:b6:71:c0:ed:56:90] modulus: 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 public exponent: 10001 ] 2022-06-10 07:32:10.513 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:32:10.519 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:32:10.526 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-10 07:32:10.555 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:32:10.557 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-10 07:32:10.565 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:32:10.566 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:32:10.568 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:32:10.568 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:32:10.569 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:32:10.600 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:32:10.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:32:10.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:32:10.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:32:10.862 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:32:10.882 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:32:10.883 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:32:10.884 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:32:10.908 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:32:10.910 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:32:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:32:10.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:32:10.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:32:10.915 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:32:10.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:32:10.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:32:10.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:32:10.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:32:10.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:32:10.923 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:32:10.935 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:a0:5a:e5:58:5f:60:c1:fe:15:34:36:05:b9:72:d3:54:69:d7:08] modulus: 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 public exponent: 10001 ] 2022-06-10 07:34:11.710 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:34:11.714 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:34:11.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-10 07:34:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:34:11.720 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-10 07:34:11.724 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:34:11.725 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:34:11.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:34:11.727 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:34:11.728 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:34:11.745 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:34:11.747 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:34:11.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:34:11.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:34:11.938 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:34:11.940 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:34:11.941 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:34:11.942 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:34:11.945 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:34:11.945 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:34:11.946 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:34:11.947 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:34:11.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:34:11.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:34:11.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:34:11.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:34:11.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:34:11.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:34:11.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:34:11.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:34:11.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:4a:09:09:80:a4:03:45:af:ba:87:c6:91:bf:ef:eb:14:26:3b:a2] modulus: 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 public exponent: 10001 ] 2022-06-10 07:36:40.915 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:36:40.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:36:40.919 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:36:40.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:36:40.922 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:36:40.931 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:36:40.934 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:36:40.935 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:36:40.936 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:36:40.938 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:36:40.946 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:36:40.946 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:36:40.947 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:36:40.948 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:36:41.180 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:36:41.183 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:36:41.183 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:36:41.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:36:41.196 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:36:41.197 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:36:41.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:36:41.207 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:36:41.207 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:36:41.210 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:36:41.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:36:41.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:36:41.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:36:41.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:36:41.218 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:36:41.220 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:36:41.234 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:94:92:c8:83:6a:ba:64:07:fc:00:5c:83:9a:af:1e:4f:20:96:4e] modulus: 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 public exponent: 10001 ] 2022-06-10 07:41:05.418 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:41:05.423 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:41:05.427 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:41:05.428 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:41:05.429 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:41:05.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:41:05.433 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:41:05.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:41:05.440 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:41:05.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:41:05.453 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:41:05.454 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:41:05.455 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:41:05.455 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:41:05.702 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:41:05.703 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:41:05.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:41:05.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:41:05.707 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:41:05.708 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:41:05.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:41:05.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:41:05.711 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:41:05.714 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:41:05.714 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:41:05.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:41:05.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:41:05.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:41:05.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:41:05.722 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:41:05.737 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:30:d1:0c:e7:a5:18:9a:a4:11:22:24:31:a7:0c:1a:26:71:67:06] modulus: d6fe7c57c585148030446f156e3cf9e2fad5067c2e7b32953bd849e09133baf48ce6005bee7d95e8927604fd02103ecfaca995fbf2d0e5c820fb62918aa08a843633cab9211fb2e09496a7acb64805ba967c28f82c9b183e210bebf7080e95c37b7bb2aecde5cf7e7e4ad41cd1e2d3f63f3bd411f27d8e19dc368ce534377ad5ec7f2ad0c0972340c21bf8999a14fe0a5b2d2f4e65a387374d66c02bb18a0f5577ce751d9492bb563859aba91955bdb014c94d830e6fad823534371bb1d70c6eb22b703f6027cfe2ee12c85b6e67cd294f2a9a5c3783f6e92247536c5c0d2390571d71dad0d70e60c5d9593e823ea40124d0c47b22d01880e0dfa31b68d722f5 public exponent: 10001 ] 2022-06-10 07:47:28.776 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:47:28.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:47:28.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:47:28.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:47:28.784 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:47:28.785 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:47:28.786 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:47:28.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:47:28.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:47:28.788 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:47:28.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:47:28.797 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:47:28.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:47:28.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:47:29.019 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:47:29.020 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:47:29.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:47:29.021 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:47:29.023 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:47:29.024 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:47:29.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:47:29.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:47:29.026 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:47:29.027 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:47:29.028 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:47:29.028 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:47:29.029 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:47:29.029 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:47:29.030 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:47:29.031 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:47:29.039 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:0f:4e:c5:ae:7b:96:46:cc:2a:d1:d7:b0:df:39:87:d2:a8:50:05] modulus: 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 public exponent: 10001 ] 2022-06-10 07:51:08.971 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:51:08.975 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:51:08.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-10 07:51:08.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:51:08.982 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-10 07:51:08.983 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:51:08.985 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:51:08.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:51:08.989 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:51:08.991 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:51:09.004 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:51:09.007 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:51:09.008 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:51:09.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:51:09.330 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:51:09.331 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:51:09.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:51:09.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:51:09.334 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:51:09.334 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:51:09.335 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:51:09.335 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:51:09.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:51:09.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:51:09.337 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:51:09.337 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:51:09.338 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:51:09.338 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:51:09.339 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:51:09.340 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:51:09.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:e6:7f:7a:9d:13:88:e5:4f:95:ab:86:82:74:aa:6d:08:c8:af:a3] modulus: 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 public exponent: 10001 ] 2022-06-10 07:52:39.840 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:52:39.842 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:52:39.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:52:39.845 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:52:39.847 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:52:39.848 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:52:39.848 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:52:39.849 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:52:39.849 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:52:39.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:52:39.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:52:39.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:52:39.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:52:39.862 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:52:40.128 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:52:40.129 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:52:40.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:52:40.130 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:52:40.132 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:52:40.133 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:52:40.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:52:40.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:52:40.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:52:40.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:52:40.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:52:40.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:52:40.138 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:52:40.138 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:52:40.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:52:40.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:52:40.145 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:c3:e7:67:85:8e:78:76:d6:8b:6b:be:26:51:4a:ad:5f:01:33:4b] modulus: ae3a931e1a1d1dd69b952f6131e6bb736121c57ce2b56719c0be47e9971aef5d63749bf95d49c18027b0f7f1eebaf18025ae4dc7ce916a871a571ce675efd4cf06ad1f1af5089cb22d766e5efec7b009fe9efee0000f24c1e331fd902d9edecdc19721dbfc3c7319bfc66b12527aa42ddf779f44b55305010d53d6bb51ab23deb9ae340530d44da1db4599e321f2b505a47b9f13b76e16382df59e3ef007dd07c814570cbabcfc3748bb538013d7a9b28c5626a99dccfd2e8ff0a11cfd15b2437d3726dbe7c6c006ad8be080df1e81432569daa67582186c406e96be656b962ce8e3dcedb13d3a580f443024ebc6f51279ca8869c67796fbde5522d0feac2ef9 public exponent: 10001 ] 2022-06-10 07:56:45.784 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:56:45.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:56:45.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:56:45.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:56:45.794 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 07:56:45.795 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:56:45.796 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:56:45.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:56:45.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:56:45.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:56:45.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:56:45.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:56:45.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:56:45.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:56:46.038 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:56:46.039 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:56:46.039 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:56:46.040 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:56:46.042 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:56:46.042 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:56:46.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:56:46.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:56:46.045 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:56:46.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:56:46.048 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:56:46.048 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:56:46.049 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:56:46.050 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:56:46.050 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:56:46.051 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:56:46.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:5d:95:f8:fb:8f:30:14:c3:d5:ba:68:39:09:23:2d:78:79:95:1d] modulus: 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 public exponent: 10001 ] 2022-06-10 07:57:48.448 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:57:48.450 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:57:48.452 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-10 07:57:48.453 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:57:48.453 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-10 07:57:48.455 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:57:48.456 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:57:48.456 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:57:48.456 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:57:48.457 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:57:48.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:57:48.464 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:57:48.464 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:57:48.465 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:57:48.729 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:57:48.730 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:57:48.730 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:57:48.731 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:57:48.733 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:57:48.733 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:57:48.734 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:57:48.734 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:57:48.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:57:48.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:57:48.737 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:57:48.737 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:57:48.738 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:57:48.738 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:57:48.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:57:48.740 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:57:48.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:66:41:95:26:41:9c:80:26:9a:23:1b:c7:f3:73:97:77:4a:f1:2b] modulus: b4ca48e103fb21e980ba25ae4f4fa6d838187e533c7c4d4054593e04c3079af6ab7fe3f57a7f96641f1b11eadcb40c4714202a28c796e4cf162062eb22c9dcfdc56e3e7224a032365c61443f5af77006792809fa8d9a3cf1daec7feb989c4decb78b3adc8bf8c307dece2a36a2dac33ae748e5197a5698cee6ecbf3ff068dbaafee105814190676ee68fef0c961e355d28d8724bb0ab6e083823438daece1846ea01e639c76d258b2d16d6df9496346582b71278da3e78d9c194aed9d33c0a38b2175b6a82222e21483f75d2ec9dc9a4976b52f11a133b3afa62f850ff0f56c3cf39c0451d6cfa5e489b093cf7aa93dd2d9b05e232e7e66fbfecdd0f3e8cc2e3 public exponent: 10001 ] 2022-06-10 07:58:10.131 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 07:58:10.133 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 07:58:10.135 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-10 07:58:10.135 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 07:58:10.136 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-10 07:58:10.137 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 07:58:10.137 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 07:58:10.137 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 07:58:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 07:58:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 07:58:10.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 07:58:10.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:58:10.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 07:58:10.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:58:10.361 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 07:58:10.361 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 07:58:10.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 07:58:10.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 07:58:10.364 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 07:58:10.364 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 07:58:10.365 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:58:10.365 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:58:10.365 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:58:10.366 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:58:10.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:58:10.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:58:10.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 07:58:10.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 07:58:10.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 07:58:10.370 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 07:58:10.403 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:42:b9:7b:5b:86:1b:ac:43:b7:2e:bf:fa:d1:a5:ea:2e:1d:06:fd] modulus: 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 public exponent: 10001 ] 2022-06-10 08:01:44.737 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 08:01:44.739 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 08:01:44.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:01:44.746 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 08:01:44.747 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:01:44.748 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 08:01:44.749 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 08:01:44.749 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 08:01:44.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 08:01:44.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 08:01:44.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 08:01:44.761 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:01:44.761 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:01:44.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:01:44.941 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 08:01:44.941 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 08:01:44.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 08:01:44.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:01:44.944 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 08:01:44.945 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 08:01:44.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:01:44.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:01:44.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:01:44.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:01:44.948 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:01:44.948 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:01:44.949 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:01:44.949 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:01:44.950 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:01:44.951 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 08:01:44.956 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:56:32:e9:c2:5d:98:95:42:3f:f4:f3:03:d7:8e:72:f4:c6:76:75] modulus: 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 public exponent: 10001 ] 2022-06-10 08:05:44.501 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 08:05:44.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 08:05:44.508 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:05:44.510 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 08:05:44.511 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:05:44.512 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 08:05:44.512 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 08:05:44.513 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 08:05:44.513 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 08:05:44.514 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 08:05:44.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 08:05:44.525 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:05:44.526 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:05:44.526 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:05:44.800 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 08:05:44.800 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 08:05:44.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 08:05:44.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:05:44.803 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 08:05:44.804 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 08:05:44.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:05:44.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:05:44.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:05:44.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:05:44.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:05:44.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:05:44.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:05:44.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:05:44.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:05:44.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 08:05:44.814 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:21:16:0c:47:47:e5:ee:3a:3e:ad:35:e5:29:b6:6f:15:92:7b:84] modulus: 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 public exponent: 10001 ] 2022-06-10 08:11:15.927 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 08:11:15.930 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 08:11:15.933 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:11:15.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 08:11:15.937 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:11:15.939 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 08:11:15.939 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 08:11:15.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 08:11:15.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 08:11:15.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 08:11:15.947 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 08:11:15.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:11:15.949 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:11:15.949 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:11:16.176 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 08:11:16.177 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 08:11:16.177 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 08:11:16.177 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:11:16.180 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 08:11:16.180 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 08:11:16.181 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:11:16.181 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:11:16.182 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:11:16.183 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:11:16.184 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:11:16.184 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:11:16.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:11:16.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:11:16.186 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:11:16.187 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 08:11:16.194 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 8ef115ed8f1ff4f3f18f7bd0de317154aae870df99fd224498ed636f1bd23371e5ff6cc8e87218b4ee6c926972a3d762ffa5b9a36939769df5e0cca46cdb61f48176996e0afbd1748d3b53cf6ba0cdc680a3e30e589184b8846c0de4b0b04e9236f2c28c76afcd6032ffea558b8317b66f60983b0dcca6224da4493af3a1a41414131ded0d6b3def242f57a26c31431593d6f63c52f2de8e87293a19a74992d1802d9950af74acadd0a2554a09b764ea7438b552030973de441c70d64c659d8ec66c0f9a854d864acf2ccee8b12ef65a0c269a20e52a037efccbef323b2de03a383b01fe62cda850826881abce2f759ff29d25a4024c898a5a1b08fefc5eda2947e1e517657eee95790a812accad3f434de082a68eea7fb323345a8bfddd6ae0a19d83abd7acb48c64fe0ba33d990a879e02191a4c51bcc572ce407e80a1566f3752948418dab43f7e5b0faf86242c8bef45d326ceb735611e3705a05b6e13bd7224021d1038609c0a3b10b4014ab6e60d82d74dc2341b9ac5786bfcd4cc7e39 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:ad:3e:f1:6b:67:a3:9d:6c:66:89:ae:ab:55:86:ef:f6:30:ee:69] modulus: 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 public exponent: 10001 ] 2022-06-10 08:15:36.210 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 08:15:36.212 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 08:15:36.214 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:15:36.215 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 08:15:36.215 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:15:36.216 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 08:15:36.217 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 08:15:36.217 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 08:15:36.217 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 08:15:36.218 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 08:15:36.225 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 08:15:36.226 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:15:36.227 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:15:36.227 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:15:36.465 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 08:15:36.465 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 08:15:36.466 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 08:15:36.466 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:15:36.469 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 08:15:36.469 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 08:15:36.471 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:15:36.472 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:15:36.473 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:15:36.474 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:15:36.475 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:15:36.475 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:15:36.477 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:15:36.477 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:15:36.478 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:15:36.479 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 08:15:36.486 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:cb:64:3d:57:23:b0:4b:6f:14:10:0c:4e:d1:de:2a:2d:39:78:07] modulus: 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 public exponent: 10001 ] 2022-06-10 08:20:48.370 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-10 08:20:48.376 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-10 08:20:48.378 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:20:48.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-10 08:20:48.382 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-10 08:20:48.384 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-10 08:20:48.385 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-10 08:20:48.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-10 08:20:48.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-10 08:20:48.389 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-10 08:20:48.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-10 08:20:48.400 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:20:48.400 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-10 08:20:48.400 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:20:48.616 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-10 08:20:48.617 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-10 08:20:48.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-10 08:20:48.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-10 08:20:48.620 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-10 08:20:48.621 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-10 08:20:48.622 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:20:48.622 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:20:48.623 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:20:48.624 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:20:48.624 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:20:48.624 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:20:48.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-10 08:20:48.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-10 08:20:48.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-10 08:20:48.627 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-10 08:20:48.634 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 652654431014641216765829318789110903761151737549 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 10 05:10:27 UTC 2022 Final Date: Wed Jun 09 05:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:e0:32:50:0e:63:5d:13:72:fc:f8:6b:f4:d7:2c:2e:ab:78:51:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 32926e47f2252faf32c81500ae753fb429fdccfa ad051011d2ad5341cb5176244b13e2f76482fc1e 38689b4f46c890ae44ee576190ec38624d497c69 237604969edb641439efdbe91ae2a1894b375327 b6c289c492cb44c91db3392ea174379f3d067846 58cc3d12c03968dc437d326d50f01af346b31629 9e4c4e91b1f03765334ce17920cd4432dbafc97f cf639ce1b1ad505bf3c1311d241af7f9227729fa 63d406623fa0f6452d0431e98e45dce6d41a1523 91e0a3988739a69b799b932ab94afada4d292e35 6364df9c28ac1ac48e8dfb54b8f136b172ae118a 60515a5bea8784174f8b36e21809d1594ab40818 f47891db04c05a3cc1fb6cedcd60ddc51bba7c2a e6419bfafdb8debc699928467bfc4ee6e5dba4ce facc783a025be6b4c61cb412837f22efb61847cb 1c9d36bee4ad4ba25be2b2bb88623118be419400 f81f1671e2219fd1f5f8b9f6a21814fbc9c13d04 e03729c40f12e20aef38d7700f3ae46499c45cd0 81b772ec7c6de9d77e69cf6cb06a831fb907984d 43a32d14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:57:d8:84:03:74:21:d2:e5:91:32:f2:f5:76:d8:a2:1b:40:45:3b] modulus: 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 public exponent: 10001 ]