By type
2022-06-22 05:44:48,436 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-22 05:44:51,219 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-22 05:44:52.866 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 22, 2022 5:44:56 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 22, 2022 5:44:56 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 22, 2022 5:44:56 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 22, 2022 5:44:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-22 05:44:58.490 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-22 05:44:59.088 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-22 05:44:59.449 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-22 05:45:01.290 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-22 05:45:01.298 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-22 05:45:01.302 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-22 05:45:01.311 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-22 05:45:01.395 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-22 05:45:01.402 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-22 05:45:01.769 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-22 05:45:04.083 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 22, 2022 5:45:05 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-22 05:45:06.728 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 20.813 seconds (JVM running for 26.959) Jun 22, 2022 5:45:13 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-22 06:49:16.770 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 06:49:16.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 06:49:17.023 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:49:17.035 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:49:17.090 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:49:17.095 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 06:49:17.097 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 06:49:17.100 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 06:49:17.101 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:49:17.113 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 06:49:17.127 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 06:49:17.132 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 06:49:17.368 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 06:49:17.377 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:49:17.378 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:49:17.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:49:19.031 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 06:49:19.047 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 06:49:19.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 06:49:19.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:49:19.080 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 06:49:19.082 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 06:49:19.085 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:49:19.086 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:49:19.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:49:19.119 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:49:19.120 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:49:19.121 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:49:19.134 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:49:19.136 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:49:19.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:49:19.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:49:19.268 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:e1:24:ba:bc:eb:81:ef:41:4a:72:90:08:90:d4:03:30:e9:89:8b] modulus: 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 public exponent: 10001 ] 2022-06-22 06:51:04.372 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 06:51:04.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 06:51:04.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-22 06:51:04.382 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:51:04.383 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-22 06:51:04.385 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 06:51:04.387 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 06:51:04.389 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 06:51:04.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 06:51:04.391 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 06:51:04.436 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 06:51:04.440 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:51:04.442 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:51:04.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:51:04.751 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 06:51:04.752 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 06:51:04.753 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 06:51:04.754 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:51:04.767 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 06:51:04.768 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 06:51:04.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:51:04.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:51:04.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:51:04.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:51:04.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:51:04.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:51:04.783 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:51:04.786 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:51:04.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:51:04.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:51:04.824 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:0a:c6:be:11:9f:86:56:b0:2c:ab:96:d4:71:d9:f9:e8:c6:f2:73] modulus: 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 public exponent: 10001 ] 2022-06-22 06:52:20.236 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 06:52:20.238 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 06:52:20.245 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-22 06:52:20.249 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:52:20.253 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-22 06:52:20.264 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 06:52:20.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 06:52:20.266 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 06:52:20.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 06:52:20.277 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 06:52:20.303 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 06:52:20.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:52:20.309 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:52:20.310 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:52:20.569 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 06:52:20.570 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 06:52:20.571 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 06:52:20.572 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:52:20.576 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 06:52:20.577 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 06:52:20.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:52:20.581 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:52:20.581 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:52:20.583 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:52:20.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:52:20.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:52:20.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:52:20.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:52:20.588 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:52:20.590 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:52:20.614 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:8c:79:72:ba:34:c0:11:a9:3f:07:6f:0b:43:8b:c9:df:67:c2:c5] modulus: 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 public exponent: 10001 ] 2022-06-22 06:54:23.369 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 06:54:23.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 06:54:23.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:54:23.382 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:54:23.383 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:54:23.424 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 06:54:23.427 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 06:54:23.432 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 06:54:23.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 06:54:23.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 06:54:23.471 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 06:54:23.473 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:54:23.475 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:54:23.476 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:54:23.763 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 06:54:23.765 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 06:54:23.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 06:54:23.776 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:54:23.786 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 06:54:23.788 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 06:54:23.800 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:54:23.801 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:54:23.802 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:54:23.804 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:54:23.804 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:54:23.805 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:54:23.808 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:54:23.809 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:54:23.810 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:54:23.811 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:54:23.828 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:e6:d1:18:d8:c5:43:b7:00:c9:59:b4:b4:a8:3d:8c:a6:b9:de:ea] modulus: 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 public exponent: 10001 ] 2022-06-22 06:58:24.826 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 06:58:24.831 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 06:58:24.834 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:58:24.836 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:58:24.837 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:58:24.838 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 06:58:24.838 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 06:58:24.839 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 06:58:24.839 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 06:58:24.840 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 06:58:24.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 06:58:24.864 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:58:24.866 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 06:58:24.867 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:58:25.174 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 06:58:25.175 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 06:58:25.176 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 06:58:25.176 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:58:25.183 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 06:58:25.184 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 06:58:25.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:58:25.186 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:58:25.186 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:58:25.191 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:58:25.192 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:58:25.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:58:25.195 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:58:25.199 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:58:25.199 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:58:25.201 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:58:25.209 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:e7:6a:9f:b6:07:eb:7a:35:bd:f0:b0:34:33:19:c8:89:47:d2:c1] modulus: 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 public exponent: 10001 ] 2022-06-22 07:02:23.574 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:02:23.578 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:02:23.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:02:23.584 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:02:23.584 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:02:23.586 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:02:23.586 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:02:23.587 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:02:23.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:02:23.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:02:23.608 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:02:23.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:02:23.619 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:02:23.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:02:23.907 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:02:23.909 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:02:23.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:02:23.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:02:23.913 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:02:23.913 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:02:23.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:02:23.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:02:23.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:02:23.930 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:02:23.931 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:02:23.931 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:02:23.937 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:02:23.938 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:02:23.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:02:23.940 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:02:23.948 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:c7:e9:4b:c2:c0:1f:ff:87:a3:ed:47:69:a9:8e:dd:5b:c3:49:77] modulus: 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 public exponent: 10001 ] 2022-06-22 07:04:51.705 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:04:51.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:04:51.721 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:04:51.723 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:04:51.728 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:04:51.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:04:51.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:04:51.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:04:51.731 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:04:51.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:04:51.740 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:04:51.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:04:51.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:04:51.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:04:52.151 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:04:52.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:04:52.152 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:04:52.152 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:04:52.154 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:04:52.154 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:04:52.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:04:52.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:04:52.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:04:52.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:04:52.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:04:52.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:04:52.159 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:04:52.160 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:04:52.160 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:04:52.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:04:52.172 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:d5:62:60:62:31:b2:8a:31:e5:e5:3b:8e:86:08:93:a5:8d:c6:d0] modulus: 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 public exponent: 10001 ] 2022-06-22 07:07:37.607 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:07:37.612 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:07:37.617 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:07:37.618 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:07:37.619 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:07:37.620 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:07:37.621 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:07:37.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:07:37.622 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:07:37.622 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:07:37.630 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:07:37.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:07:37.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:07:37.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:07:37.989 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:07:37.990 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:07:37.991 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:07:37.991 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:07:37.994 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:07:37.994 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:07:37.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:07:37.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:07:37.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:07:37.997 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:07:37.998 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:07:37.998 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:07:37.999 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:07:38.000 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:07:38.000 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:07:38.002 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:07:38.011 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:19:2b:bd:22:17:18:41:12:d0:a1:4f:de:4f:9a:d3:f0:2b:a7:7b] modulus: 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 public exponent: 10001 ] 2022-06-22 07:09:54.729 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:09:54.733 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:09:54.738 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-22 07:09:54.740 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:09:54.741 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-22 07:09:54.742 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:09:54.743 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:09:54.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:09:54.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:09:54.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:09:54.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:09:54.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:09:54.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:09:54.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:09:55.105 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:09:55.106 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:09:55.106 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:09:55.106 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:09:55.108 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:09:55.109 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:09:55.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:09:55.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:09:55.111 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:09:55.112 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:09:55.113 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:09:55.113 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:09:55.114 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:09:55.115 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:09:55.115 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:09:55.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:09:55.123 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:81:f0:c4:b3:e0:93:9a:9a:f3:2b:26:d4:81:e8:12:5b:56:16:2d] modulus: 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 public exponent: 10001 ] 2022-06-22 07:11:47.844 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:11:47.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:11:47.849 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:11:47.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:11:47.852 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:11:47.852 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:11:47.853 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:11:47.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:11:47.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:11:47.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:11:47.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:11:47.871 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:11:47.871 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:11:47.872 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:11:48.566 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:11:48.567 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:11:48.568 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:11:48.569 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:11:48.572 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:11:48.574 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:11:48.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:11:48.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:11:48.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:11:48.577 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:11:48.578 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:11:48.579 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:11:48.580 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:11:48.595 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:11:48.599 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:11:48.609 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:11:48.617 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:cf:2d:c1:0e:9d:4d:45:72:23:c9:ad:c4:2c:1b:52:60:a2:b5:9e] modulus: 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 public exponent: 10001 ] 2022-06-22 07:15:18.132 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:15:18.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:15:18.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-22 07:15:18.142 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:15:18.144 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-22 07:15:18.145 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:15:18.146 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:15:18.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:15:18.148 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:15:18.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:15:18.163 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:15:18.165 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:15:18.166 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:15:18.168 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:18.377 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:15:18.378 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:15:18.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:15:18.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:18.382 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:15:18.383 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:15:18.383 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:18.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:18.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:18.386 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:18.386 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:18.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:18.388 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:18.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:18.390 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:18.401 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:15:18.420 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:e2:c2:8c:33:9e:7d:1e:4a:94:17:a5:0e:f4:be:bc:81:37:97:61] modulus: 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 public exponent: 10001 ] 2022-06-22 07:15:37.555 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:15:37.557 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:15:37.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-22 07:15:37.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:15:37.572 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-22 07:15:37.573 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:15:37.573 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:15:37.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:15:37.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:15:37.575 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:15:37.589 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:15:37.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:15:37.596 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:15:37.596 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:37.825 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:15:37.829 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:15:37.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:15:37.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:37.844 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:15:37.845 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:15:37.846 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:37.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:37.851 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:37.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:37.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:37.859 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:37.869 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:37.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:37.881 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:37.887 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:15:37.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:3f:04:3d:5c:e6:25:83:af:b3:2c:11:ec:e9:99:e7:c9:07:d1:bd] modulus: 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 public exponent: 10001 ] 2022-06-22 07:17:03.962 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:17:03.965 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:17:03.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:17:03.970 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:17:03.970 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:17:03.972 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:17:03.973 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:17:03.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:17:03.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:17:03.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:17:03.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:17:03.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:17:03.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:17:03.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:17:04.206 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:17:04.207 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:17:04.208 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:17:04.208 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:17:04.211 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:17:04.212 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:17:04.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:17:04.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:17:04.215 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:17:04.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:17:04.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:17:04.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:17:04.217 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:17:04.217 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:17:04.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:17:04.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:17:04.228 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:12:5b:05:77:c0:34:89:c2:43:6c:ae:6a:9a:af:f2:b7:ca:03:9a] modulus: d6bbbbdccaeca343b01f74f2fc78973829a7ab571c156b68453476316d8776f88fbb75bf264308bc1b3c7ca55998f53cce81ed48918763b3dbfc80c215ce0dbfd2a74189ccd745d1b79680d5236a447671c13669551a02c060eea3aec737e41e009d3f124cd69f2d34301f39bcd4825373af2c350641fd73ea49eb73c93e86a458bbe39fb26e11f241bbeb105ec898b5d69bb60e2fc1450ce0aa92a14346f8a27818ac0072449efc5cfb3901d4b78c8e027ee584b6ac0d216e472e76bb2f98948b57bc43c15e640bb68df16be08664ee0becb1a3757a9b2d35c5bc739ad7c0806b248036495dcc6e5b1e9ce85fe68cb8b2d828768c81bbfbc6ef5986b43f6735 public exponent: 10001 ] 2022-06-22 07:22:04.922 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-22 07:22:04.933 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-22 07:22:04.938 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:22:04.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:22:04.942 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:22:04.943 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-22 07:22:04.944 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-22 07:22:04.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-22 07:22:04.948 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-22 07:22:04.950 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-22 07:22:04.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-22 07:22:04.965 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:22:04.967 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-22 07:22:04.967 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:22:05.258 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-22 07:22:05.259 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-22 07:22:05.259 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-22 07:22:05.260 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:22:05.262 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-22 07:22:05.263 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-22 07:22:05.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:22:05.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:22:05.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:22:05.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:22:05.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:22:05.267 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:22:05.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:22:05.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:22:05.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:22:05.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:22:05.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:b8:5a:6c:b0:5f:4b:47:e5:a4:c3:ca:67:e9:44:d0:0b:84:e0:fa] modulus: b7d52fc5ea47454578e22bad1277daa8326e6fe9464cff17484b1b93141ba0f9b133157628edb392a83e870a42b324cfc9d26952c4833726f7513abf35aaad97c56979c755f159e709243eef6aa68e54884c92137146844843448bf29bb1620875ea25bf2244e99cfce82e4d03c0c145e0a7640a4114fcee2237c51806beb7f5d25ae77fd7c33e97ae7c27290f8769a84f20f74f70ae1de9f20cb1bc6f045d766e8f0542cf93174cb39fd0f1fbb19cda2197903113837313485d6cf0b02cc817759e463a8863ca8968841246249c2982096ed941141c0bc43c4b6c12b284b7a819bfa554a2b76d80e11fcd61543d3c1a9f47edc56aa38329e727344b01317d43 public exponent: 10001 ]