By type
2022-06-19 05:16:48,148 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-19 05:16:49,121 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-19 05:16:50.009 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 19, 2022 5:16:52 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 19, 2022 5:16:52 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 19, 2022 5:16:52 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 19, 2022 5:16:52 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-19 05:16:52.886 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-19 05:16:53.191 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-19 05:16:53.407 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-19 05:16:54.162 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-19 05:16:54.167 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-19 05:16:54.168 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-19 05:16:54.173 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-19 05:16:54.216 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-19 05:16:54.220 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-19 05:16:54.355 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-19 05:16:54.991 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 19, 2022 5:16:55 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-19 05:16:55.994 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.723 seconds (JVM running for 10.628) Jun 19, 2022 5:17:23 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-19 05:17:34.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 05:17:34.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 05:17:34.742 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-19 05:17:34.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 05:17:34.768 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-19 05:17:34.772 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 05:17:34.773 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 05:17:34.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 05:17:34.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:17:34.779 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 05:17:34.785 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 05:17:34.789 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 05:17:34.830 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 05:17:34.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:17:34.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:17:34.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:17:35.913 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 05:17:35.915 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 05:17:35.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 05:17:35.918 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:17:35.928 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 05:17:35.928 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 05:17:35.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:17:35.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:17:35.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:17:35.948 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:17:35.949 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:17:35.949 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:17:35.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:17:35.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:17:35.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:17:35.957 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 05:17:35.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:bb:33:6c:fb:08:86:eb:a2:d5:1f:bc:09:0f:eb:32:98:be:2e:c2] modulus: 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 public exponent: 10001 ] 2022-06-19 06:36:06.283 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:36:06.287 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:36:06.290 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:36:06.292 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:36:06.293 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:36:06.294 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:36:06.294 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:36:06.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:36:06.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:36:06.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:36:06.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:36:06.304 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:36:06.305 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:36:06.305 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:36:06.753 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:36:06.754 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:36:06.754 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:36:06.755 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:36:06.759 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:36:06.760 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:36:06.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:36:06.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:36:06.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:36:06.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:36:06.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:36:06.764 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:36:06.765 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:36:06.766 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:36:06.767 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:36:06.768 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:36:06.778 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:77:b4:a1:ad:8f:a0:7e:0d:07:9e:73:9c:9c:df:8f:a0:56:27:e0] modulus: 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 public exponent: 10001 ] 2022-06-19 06:38:02.788 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:38:02.790 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:38:02.792 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-19 06:38:02.793 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:38:02.794 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-19 06:38:02.795 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:38:02.795 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:38:02.796 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:38:02.798 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:38:02.798 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:38:02.814 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:38:02.815 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:38:02.815 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:38:02.816 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:38:03.272 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:38:03.273 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:38:03.274 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:38:03.274 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:38:03.276 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:38:03.277 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:38:03.277 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:38:03.277 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:38:03.278 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:38:03.279 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:38:03.279 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:38:03.279 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:38:03.280 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:38:03.280 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:38:03.281 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:38:03.282 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:38:03.286 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:ed:1d:6b:02:9b:9a:e8:80:79:ef:c3:14:21:93:43:18:14:70:6a] modulus: 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 public exponent: 10001 ] 2022-06-19 06:39:28.299 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:39:28.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:39:28.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-19 06:39:28.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:39:28.305 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-19 06:39:28.306 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:39:28.306 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:39:28.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:39:28.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:39:28.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:39:28.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:39:28.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:39:28.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:39:28.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:39:28.678 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:39:28.679 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:39:28.680 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:39:28.680 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:39:28.683 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:39:28.684 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:39:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:39:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:39:28.686 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:39:28.687 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:39:28.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:39:28.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:39:28.690 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:39:28.690 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:39:28.690 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:39:28.692 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:39:28.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: b285d863c4eed7965915bad9f10fbf04c7a764cf9c1b1ff3f9e0c3981c47a1af9b1c20fec522963fdac550289be07926319f4088770968103c7f306d2e486d310808d3c8267dea48f932733e3682e2469712a4a08a95f409da0405a501a9404542beeeb5bbbbd466a189eea99ef2ae5eacd3e8829ea07856218859dfdc1fc7b4ea440f8f66d57366d8f6628f40ae1ab93f8cc01212324afec69c26cf5add0349acb32674d93d53b321d4a3c0299653293b26e601e711ef82b4aa9d5bd61b2b8728724af5d9a48df58a16d0b908c5d444dd5968767828d6cbbd74129e39c3299140f125342d7da851b8b23abc382a4c796f7c666961a48d2d9b2ed707d96d429f586170da58ad1d953a3e419e08bb7c57e97e403c777fe31cd40056eeaf2f3c20419dfbd28728c1b28202412f0bf3b4d13633bc9035cc946c7296832e44c5ba75b9182d443f2727b3ad9d8f3e072970203e7b0e19ec5a36fdbbf868573f2efce5935aa8343f8955ffa99ee9f841dabb03c29dda9367247272a862e4d8df550ff7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:71:af:16:bf:af:45:9d:ad:ba:ef:98:2d:8c:70:40:e5:a8:58:f9] modulus: 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 public exponent: 10001 ] 2022-06-19 06:41:29.728 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:41:29.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:41:29.739 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:41:29.740 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:41:29.743 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:41:29.769 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:41:29.776 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:41:29.783 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:41:29.784 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:41:29.785 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:41:29.791 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:41:29.792 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:41:29.793 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:41:29.793 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:41:30.407 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:41:30.408 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:41:30.409 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:41:30.409 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:41:30.412 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:41:30.413 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:41:30.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:41:30.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:41:30.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:41:30.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:41:30.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:41:30.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:41:30.418 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:41:30.418 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:41:30.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:41:30.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:41:30.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: b285d863c4eed7965915bad9f10fbf04c7a764cf9c1b1ff3f9e0c3981c47a1af9b1c20fec522963fdac550289be07926319f4088770968103c7f306d2e486d310808d3c8267dea48f932733e3682e2469712a4a08a95f409da0405a501a9404542beeeb5bbbbd466a189eea99ef2ae5eacd3e8829ea07856218859dfdc1fc7b4ea440f8f66d57366d8f6628f40ae1ab93f8cc01212324afec69c26cf5add0349acb32674d93d53b321d4a3c0299653293b26e601e711ef82b4aa9d5bd61b2b8728724af5d9a48df58a16d0b908c5d444dd5968767828d6cbbd74129e39c3299140f125342d7da851b8b23abc382a4c796f7c666961a48d2d9b2ed707d96d429f586170da58ad1d953a3e419e08bb7c57e97e403c777fe31cd40056eeaf2f3c20419dfbd28728c1b28202412f0bf3b4d13633bc9035cc946c7296832e44c5ba75b9182d443f2727b3ad9d8f3e072970203e7b0e19ec5a36fdbbf868573f2efce5935aa8343f8955ffa99ee9f841dabb03c29dda9367247272a862e4d8df550ff7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:fd:26:0a:b3:af:75:8c:4a:81:c6:43:a0:cf:24:36:d0:37:82:e3] modulus: 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 public exponent: 10001 ] 2022-06-19 06:44:55.658 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:44:55.663 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:44:55.665 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:44:55.666 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:44:55.667 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:44:55.667 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:44:55.670 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:44:55.670 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:44:55.671 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:44:55.672 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:44:55.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:44:55.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:44:55.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:44:55.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:44:56.200 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:44:56.201 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:44:56.201 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:44:56.202 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:44:56.203 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:44:56.204 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:44:56.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:44:56.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:44:56.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:44:56.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:44:56.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:44:56.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:44:56.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:44:56.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:44:56.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:44:56.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:44:56.212 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:fc:89:9d:fa:dc:04:12:96:26:ca:f0:36:c3:b9:3d:2b:8b:c3:bb] modulus: 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 public exponent: 10001 ] 2022-06-19 06:48:13.165 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:48:13.168 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:48:13.170 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:48:13.171 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:48:13.172 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:48:13.172 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:48:13.173 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:48:13.173 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:48:13.174 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:48:13.174 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:48:13.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:48:13.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:48:13.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:48:13.182 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:48:13.591 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:48:13.593 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:48:13.593 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:48:13.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:48:13.596 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:48:13.597 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:48:13.598 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:48:13.599 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:48:13.600 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:48:13.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:48:13.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:48:13.603 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:48:13.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:48:13.605 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:48:13.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:48:13.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:48:13.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:25:e1:1b:d9:2b:23:f6:0b:19:ab:b7:1a:45:f4:09:f0:06:04:5c] modulus: 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 public exponent: 10001 ] 2022-06-19 06:50:09.526 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:50:09.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:50:09.529 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:50:09.531 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:50:09.532 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:50:09.533 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:50:09.533 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:50:09.534 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:50:09.534 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:50:09.534 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:50:09.539 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:50:09.541 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:50:09.541 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:50:09.542 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:50:09.919 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:50:09.920 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:50:09.921 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:50:09.921 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:50:09.924 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:50:09.925 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:50:09.925 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:50:09.926 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:50:09.926 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:50:09.928 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:50:09.929 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:50:09.930 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:50:09.931 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:50:09.932 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:50:09.932 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:50:09.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:50:09.942 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:fa:ae:b1:6b:e5:3b:00:8f:78:c2:ea:76:29:0c:c8:fa:05:6a:e7] modulus: e3b6cf21fd0e952f5f78da674cba3b3b667fea9b179610dd9f85f67b998df73b75b6256b254361eecde0518253cadbb8082f7c46b807e432928e571244523899ab3ee204eacd6ec5a889c5c6d2aafafadd6f726cb9b479d68b00a8565083eec4d12e608829e7070a073a9191e6dc8861b3d7fde6b146615b5ea9511f033e5678a14ad6e4cfde7a66da82b221003e0c3c3c783d0d3908da778eee617914cbfda7b8abe41d7a08740b1950399f64301f292f5441bce03c9b0e8c15b71ef1adc73797d93a242e295f4587b48f9232cfccdbb5ec29eb0b45748f822ad8417b013e6efe7790e3e35309743310885f903ba32028e7ff4143bd0b2509fbb808a5e016ef public exponent: 10001 ] 2022-06-19 06:52:26.476 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:52:26.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:52:26.479 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:52:26.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:52:26.481 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:52:26.481 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:52:26.482 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:52:26.482 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:52:26.483 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:52:26.483 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:52:26.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:52:26.489 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:52:26.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:52:26.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:52:26.827 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:52:26.827 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:52:26.828 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:52:26.828 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:52:26.831 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:52:26.831 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:52:26.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:52:26.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:52:26.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:52:26.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:52:26.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:52:26.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:52:26.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:52:26.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:52:26.835 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:52:26.838 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:52:26.842 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:fb:f6:81:0e:7d:d8:fd:89:87:c0:eb:29:be:fc:8f:25:70:9d:8c] modulus: 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 public exponent: 10001 ] 2022-06-19 06:55:03.677 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:55:03.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:55:03.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-19 06:55:03.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:55:03.681 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-19 06:55:03.682 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:55:03.682 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:55:03.683 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:55:03.683 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:55:03.684 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:55:03.693 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:55:03.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:55:03.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:55:03.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:55:04.046 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:55:04.048 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:55:04.048 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:55:04.049 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:55:04.050 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:55:04.050 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:55:04.051 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:55:04.052 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:55:04.053 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:55:04.053 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:55:04.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:55:04.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:55:04.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:55:04.055 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:55:04.055 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:55:04.055 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:55:04.059 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: b285d863c4eed7965915bad9f10fbf04c7a764cf9c1b1ff3f9e0c3981c47a1af9b1c20fec522963fdac550289be07926319f4088770968103c7f306d2e486d310808d3c8267dea48f932733e3682e2469712a4a08a95f409da0405a501a9404542beeeb5bbbbd466a189eea99ef2ae5eacd3e8829ea07856218859dfdc1fc7b4ea440f8f66d57366d8f6628f40ae1ab93f8cc01212324afec69c26cf5add0349acb32674d93d53b321d4a3c0299653293b26e601e711ef82b4aa9d5bd61b2b8728724af5d9a48df58a16d0b908c5d444dd5968767828d6cbbd74129e39c3299140f125342d7da851b8b23abc382a4c796f7c666961a48d2d9b2ed707d96d429f586170da58ad1d953a3e419e08bb7c57e97e403c777fe31cd40056eeaf2f3c20419dfbd28728c1b28202412f0bf3b4d13633bc9035cc946c7296832e44c5ba75b9182d443f2727b3ad9d8f3e072970203e7b0e19ec5a36fdbbf868573f2efce5935aa8343f8955ffa99ee9f841dabb03c29dda9367247272a862e4d8df550ff7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:3b:da:b1:2a:1a:d7:bf:05:e6:ae:bf:12:3a:92:d7:c4:ff:6a:1f] modulus: 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 public exponent: 10001 ] 2022-06-19 06:56:46.658 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 06:56:46.661 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 06:56:46.663 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:56:46.664 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 06:56:46.664 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 06:56:46.668 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 06:56:46.669 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 06:56:46.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 06:56:46.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 06:56:46.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 06:56:46.677 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 06:56:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:56:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 06:56:46.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:56:47.141 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 06:56:47.146 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 06:56:47.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 06:56:47.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 06:56:47.149 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 06:56:47.149 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 06:56:47.150 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:56:47.150 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:56:47.150 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:56:47.151 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:56:47.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:56:47.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:56:47.156 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 06:56:47.157 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 06:56:47.157 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 06:56:47.158 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 06:56:47.166 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:47:7f:89:c7:bd:e3:08:10:6b:59:be:06:ac:be:a8:d5:c2:62:ca] modulus: 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 public exponent: 10001 ] 2022-06-19 07:00:38.714 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:00:38.715 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:00:38.717 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:00:38.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:00:38.718 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:00:38.719 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:00:38.719 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:00:38.720 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:00:38.720 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:00:38.721 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:00:38.726 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:00:38.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:00:38.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:00:38.728 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:00:39.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:00:39.064 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:00:39.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:00:39.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:00:39.066 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:00:39.067 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:00:39.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:00:39.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:00:39.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:00:39.068 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:00:39.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:00:39.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:00:39.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:00:39.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:00:39.071 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:00:39.071 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:00:39.075 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:87:39:d1:0b:46:e6:51:1b:64:46:58:ca:cc:ad:98:5e:1f:af:67] modulus: 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 public exponent: 10001 ] 2022-06-19 07:01:18.811 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:01:18.812 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:01:18.814 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-19 07:01:18.814 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:01:18.815 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-19 07:01:18.816 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:01:18.816 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:01:18.817 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:01:18.817 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:01:18.818 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:01:18.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:01:18.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:01:18.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:01:18.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:01:19.130 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:01:19.131 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:01:19.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:01:19.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:01:19.134 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:01:19.135 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:01:19.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:01:19.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:01:19.137 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:01:19.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:01:19.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:01:19.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:01:19.139 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:01:19.140 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:01:19.140 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:01:19.141 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:01:19.144 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:59:79:ee:2b:9f:51:c2:d1:de:33:92:7c:d1:88:15:64:92:72:df] modulus: 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 public exponent: 10001 ] 2022-06-19 07:01:56.786 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:01:56.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:01:56.788 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-19 07:01:56.789 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:01:56.789 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-19 07:01:56.789 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:01:56.790 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:01:56.790 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:01:56.790 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:01:56.790 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:01:56.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:01:56.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:01:56.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:01:56.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:01:57.045 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:01:57.046 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:01:57.046 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:01:57.047 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:01:57.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:01:57.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:01:57.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:01:57.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:01:57.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:01:57.050 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:01:57.050 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:01:57.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:01:57.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:01:57.052 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:01:57.052 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:01:57.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:01:57.055 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:cf:9c:30:55:e2:46:c2:90:f3:29:15:e2:0b:7b:cd:a9:09:ac:ce] modulus: c46a6916cd7a6ce5d48ba5de31c8267754384bee47dd3c90c481e8b95f0b59599a8ff7f37b97e027364b5a7535c683bdcd84a5aed75f6bae327248b53c72220f3a35b2c374b53373d159ee752b8e38d6c8ed28c462c64fc871b2f08f779a8827e39e048a7e7f2d7dddc9d465d51f4bd1184682acf0252c51d7d69c6e1a229ef0d86c4a2372f9e3f56f0c2566e2dc9b0ac25244f028751de94ab25be95ab430d19b83fd62c4476f76795894f2d2a7b3e7e3f9666f5057e103133f92a7dea092b4c0b56357de42199db3a6087472bfdf8519a693d855facee2f0217a8e84dc61ed30c98f3c34ec50247f15ec6c77c812bf1344413885da984a0c65ad8ec69bf273 public exponent: 10001 ] 2022-06-19 07:05:33.910 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:05:33.912 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:05:33.914 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:05:33.915 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:05:33.916 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:05:33.917 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:05:33.917 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:05:33.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:05:33.918 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:05:33.918 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:05:33.923 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:05:33.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:05:33.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:05:33.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:05:34.411 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:05:34.412 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:05:34.412 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:05:34.413 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:05:34.414 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:05:34.415 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:05:34.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:05:34.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:05:34.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:05:34.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:05:34.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:05:34.418 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:05:34.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:05:34.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:05:34.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:05:34.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:05:34.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:3f:6e:40:0f:8c:1f:e9:14:8e:5b:75:e7:7d:0c:81:cf:77:b7:b2] modulus: cecea2e4ae224e0d0afa530c94b2743737b32c1f6a218f48d864d9f101f3503710bf402bef5d0a0d3cba066b844a16313084cf93b1b902ecbf465af66a2c2a3dccc097dbe09c49e1aad7e65e12842223dd3bc12b7f5574875d02cb97a54a3515aa93f1f8ca27baf66dd8ab40bfd4e37fd69caf667b974f9a0eec3d68f6d10e6644ce40dcc13dc465bd744f0bb89de9f9dd2ae89e9e30c89c8ad0b00679a68cb1a48c99cf6b48b34ae69d7d185ce01b4d571d6a822385e2f82949cbb59a1a078e0db42bc9ae80869f1625d88321502209fc79a5a373eed7ef5d1099deecb3ef42ef5f5f42725f3096ad2eb6ffdf3e5756c4fe0bae7e804d8699b6ec9ce4b214ed public exponent: 10001 ] 2022-06-19 07:10:13.118 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:10:13.120 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:10:13.123 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:10:13.125 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:10:13.126 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:10:13.127 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:10:13.129 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:10:13.131 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:10:13.132 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:10:13.133 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:10:13.143 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:10:13.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:10:13.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:10:13.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:10:13.520 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:10:13.520 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:10:13.521 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:10:13.522 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:10:13.523 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:10:13.523 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:10:13.524 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:10:13.524 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:10:13.525 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:10:13.525 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:10:13.526 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:10:13.526 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:10:13.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:10:13.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:10:13.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:10:13.528 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:10:13.532 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:e0:0b:7d:01:ca:3e:f7:7b:36:98:84:9c:a9:3a:28:bf:3c:0c:52] modulus: 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 public exponent: 10001 ] 2022-06-19 07:14:44.915 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:14:44.919 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:14:44.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:14:44.923 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:14:44.924 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:14:44.925 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:14:44.925 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:14:44.925 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:14:44.926 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:14:44.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:14:44.933 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:14:44.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:14:44.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:14:44.935 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:14:45.253 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:14:45.254 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:14:45.254 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:14:45.254 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:14:45.256 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:14:45.256 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:14:45.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:14:45.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:14:45.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:14:45.259 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:14:45.259 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:14:45.259 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:14:45.260 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:14:45.260 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:14:45.261 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:14:45.262 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:14:45.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:e2:ab:70:9a:86:af:56:25:84:60:3d:bb:63:5f:6e:34:e9:15:37] modulus: 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 public exponent: 10001 ] 2022-06-19 07:19:35.703 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:19:35.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:19:35.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:19:35.707 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:19:35.707 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:19:35.708 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:19:35.708 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:19:35.709 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:19:35.709 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:19:35.709 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:19:35.714 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:19:35.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:19:35.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:19:35.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:19:36.032 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:19:36.033 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:19:36.033 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:19:36.034 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:19:36.035 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:19:36.035 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:19:36.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:19:36.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:19:36.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:19:36.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:19:36.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:19:36.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:19:36.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:19:36.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:19:36.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:19:36.040 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:19:36.044 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:37:f7:31:61:9f:b2:e2:4b:b6:0a:6d:94:de:55:e9:49:1f:a9:4a] modulus: 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 public exponent: 10001 ] 2022-06-19 07:23:32.508 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:23:32.511 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:23:32.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:23:32.514 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:23:32.515 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:23:32.516 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:23:32.516 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:23:32.516 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:23:32.517 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:23:32.518 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:23:32.523 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:23:32.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:23:32.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:23:32.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:23:32.983 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:23:32.983 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:23:32.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:23:32.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:23:32.990 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:23:32.991 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:23:32.991 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:23:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:23:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:23:32.993 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:23:32.993 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:23:32.994 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:23:32.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:23:32.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:23:32.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:23:32.996 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:23:33.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:fd:c5:0f:f5:f0:e7:10:f6:fe:44:00:92:d1:a3:65:88:d1:b1:3c] modulus: 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 public exponent: 10001 ] 2022-06-19 07:29:43.712 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:29:43.713 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:29:43.716 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:29:43.716 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:29:43.717 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:29:43.717 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:29:43.718 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:29:43.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:29:43.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:29:43.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:29:43.723 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:29:43.724 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:29:43.725 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:29:43.725 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:29:44.112 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:29:44.113 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:29:44.113 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:29:44.113 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:29:44.114 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:29:44.115 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:29:44.115 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:29:44.115 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:29:44.115 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:29:44.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:29:44.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:29:44.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:29:44.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:29:44.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:29:44.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:29:44.118 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:29:44.121 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: b285d863c4eed7965915bad9f10fbf04c7a764cf9c1b1ff3f9e0c3981c47a1af9b1c20fec522963fdac550289be07926319f4088770968103c7f306d2e486d310808d3c8267dea48f932733e3682e2469712a4a08a95f409da0405a501a9404542beeeb5bbbbd466a189eea99ef2ae5eacd3e8829ea07856218859dfdc1fc7b4ea440f8f66d57366d8f6628f40ae1ab93f8cc01212324afec69c26cf5add0349acb32674d93d53b321d4a3c0299653293b26e601e711ef82b4aa9d5bd61b2b8728724af5d9a48df58a16d0b908c5d444dd5968767828d6cbbd74129e39c3299140f125342d7da851b8b23abc382a4c796f7c666961a48d2d9b2ed707d96d429f586170da58ad1d953a3e419e08bb7c57e97e403c777fe31cd40056eeaf2f3c20419dfbd28728c1b28202412f0bf3b4d13633bc9035cc946c7296832e44c5ba75b9182d443f2727b3ad9d8f3e072970203e7b0e19ec5a36fdbbf868573f2efce5935aa8343f8955ffa99ee9f841dabb03c29dda9367247272a862e4d8df550ff7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:e3:5a:ad:65:7b:51:b6:67:cd:46:5c:8d:58:bc:4e:0b:ff:89:ba] modulus: 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 public exponent: 10001 ] 2022-06-19 07:33:40.705 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 07:33:40.707 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 07:33:40.709 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:33:40.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 07:33:40.711 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 07:33:40.711 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 07:33:40.712 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 07:33:40.712 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 07:33:40.712 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 07:33:40.713 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 07:33:40.718 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 07:33:40.719 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:33:40.719 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 07:33:40.719 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:33:41.047 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 07:33:41.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 07:33:41.048 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 07:33:41.048 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 07:33:41.050 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 07:33:41.050 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 07:33:41.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:33:41.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:33:41.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:33:41.052 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:33:41.052 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:33:41.052 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:33:41.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 07:33:41.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 07:33:41.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 07:33:41.054 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 07:33:41.058 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585458372990002494036021613007504037327467940538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 05:12:49 UTC 2022 Final Date: Fri Jun 18 05:12:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:c0:44:b8:7a:32:8a:c0:22:e7:75:94:94:e7:aa:0f:fa:b7:20:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fadb8207bb0219303c0a7a41788bbc7061fa76a 11b6a82c864251e83761295b6692300d866b0edc 8257ecc252751eb9ae5dd6c7ac7b4d2996ba88f2 aee372aa175e30202c8f5528748ae2198edc5732 015d1c8fead6f60b9dd158c8230cc190c622cec8 c56b787312df28d914ebcc358662fc6d5d379788 c1eb847170a7642e1e30adb0152b7cca4662a06e e3534a27f3ca87e3aa006ab38aca6a1bce2dabb7 8a06877cd7975a1c6fbc95f948f52f37a6638782 55d91e51e0655ec5a4f54becee1215e9984e9eaa a8f5d73e252b221f13a4316adb0d345ab270cb0e 00832b37cea75b64ac2ec4c1223f39fc5a812a93 85cc733fcbfdcc1890f23a8561b2fb80df2e310e 97593853e3289116712f52b614bcbd9b980822c1 9e7fe2b0d7a71558200b4b8edbbb11a4b026b2c3 8dadbcdee677ae0820f029a5863ee73d24c00278 0d2892488fba9e2fa61318a721722e499f3a8c4d 9355ff4b0d05c1fa3a4bc8d66f92aef06a211ac2 814dae232cb20db482b5c7e88560c544711663e0 82953813 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:36:51:f8:43:d6:b6:3e:ef:4c:f8:55:5d:2d:65:a2:2c:e8:b1:fa] modulus: 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 public exponent: 10001 ]