By type
2022-01-04 02:31:42,548 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-01-04 02:31:47,258 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2022-01-04 02:31:50.566 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2022-01-04 02:32:05.162 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-01-04 02:32:06.450 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-01-04 02:32:07.154 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-01-04 02:32:20.259 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 40.49 seconds (JVM running for 48.444) 2022-01-04 03:16:37.460 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 03:16:37.479 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 03:16:37.662 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-01-04 03:16:37.667 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 03:16:37.680 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-01-04 03:16:37.683 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 03:16:37.684 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 03:16:37.685 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 03:16:37.686 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 03:16:37.746 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 03:16:37.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 03:16:37.762 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 03:16:37.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 03:16:37.960 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 03:16:37.961 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 03:16:37.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 03:16:39.317 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 03:16:39.320 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 03:16:39.321 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 03:16:39.322 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 03:16:39.347 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 03:16:39.347 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 03:16:39.348 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 03:16:39.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 03:16:39.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 03:16:39.446 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 03:16:39.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 03:16:39.448 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 03:16:39.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 03:16:39.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 03:16:39.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 03:16:39.459 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 03:16:39.660 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:5a:59:91:63:f9:23:6e:8d:12:d5:29:d4:9b:bf:fc:66:09:32:0d] modulus: c809889fbc5671152c981a593590db2d7a48e3390480414161fc5661b9b896885c761163b0d773d868a81a99bc4ede02363f96d8c56e78fac1d87a370af658456b3bf98c72c94ebf8a1e8abf1219e4ed9846fe47cd9ab3174989670a8d364ba204fc698b7b16af78414944dce1eb261a841a55a7e75227103ddc79fd7e7f3bb111302372516a9c4d3d427abddebacd1f8db3e0278699d6972b125533bb5539b5d605f4e1f345ad990370cb9cc84bc95a68e7bac534c016f4654961b4d27b6f87aa4b4e90458b9c188a2b2050c68fc87c5c69c7d74d5e6ff5e1c27f97bf42bb713e5ef2645ecb36e6e3193390d8c9454be5ccd9b7c5b140da93010ecd91729c77 public exponent: 10001 ] 2022-01-04 05:34:10.676 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 05:34:10.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 05:34:10.680 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:34:10.681 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 05:34:10.682 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:34:10.683 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 05:34:10.683 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 05:34:10.684 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 05:34:10.684 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 05:34:10.685 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 05:34:10.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 05:34:10.753 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:34:10.754 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:34:10.754 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:34:10.947 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 05:34:10.948 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 05:34:10.948 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 05:34:10.949 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:34:10.954 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 05:34:10.954 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 05:34:10.955 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:34:10.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:34:10.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:34:10.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:34:10.959 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:34:10.959 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:34:10.960 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:34:10.960 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:34:10.960 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:34:10.961 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 05:34:11.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:94:e1:39:90:5a:01:9a:f3:c6:2e:9a:a3:c5:9a:7e:b8:dc:be:7b] modulus: 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 public exponent: 10001 ] 2022-01-04 05:42:53.546 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 05:42:53.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 05:42:53.549 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:42:53.549 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 05:42:53.550 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:42:53.550 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 05:42:53.550 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 05:42:53.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 05:42:53.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 05:42:53.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 05:42:53.559 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 05:42:53.559 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:42:53.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:42:53.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:42:53.645 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 05:42:53.646 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 05:42:53.646 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 05:42:53.647 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:42:53.651 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 05:42:53.651 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 05:42:53.652 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:42:53.653 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:42:53.653 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:42:53.654 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:42:53.655 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:42:53.655 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:42:53.656 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:42:53.656 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:42:53.657 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:42:53.657 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 05:42:53.660 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:54:c9:1a:71:44:37:60:71:8c:be:11:48:5e:d1:af:e6:fc:e6:26] modulus: d051b35622ca490009c86c66431ba55b9213958215cfc950befaf6b062be000d14caddaee644ec3122fab92f75d85c837800238423db8b80d27581dc41ab07ed557e648918b5b2bef5fb0c3a975feb1c2cb9156ead6fea484b0cb598654d354bf3a7268efe16838925d2b0137e0cf89b264224afcd1aa183b6ce37f17b786508e99447a16dbb83c9be11e7b8efcb8f9e5cdd0121d44117a4ccc689ab4fde023d620f47c0081b0e34c93525b4c1cfbaaac47c6311b97c92a3662e7a1b08874dcd6fc5db598776aeb1af0213d1f7d7115c6bf7a14f801d2ec93b08e4abbfaba0b138a65cf7b48e10ec41f179ca7dac36214cdf4eb46d0939b2ee1f3492b3dbd96d public exponent: 10001 ] 2022-01-04 05:44:55.018 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 05:44:55.019 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 05:44:55.021 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:44:55.021 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 05:44:55.022 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:44:55.022 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 05:44:55.023 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 05:44:55.023 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 05:44:55.023 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 05:44:55.024 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 05:44:55.049 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 05:44:55.049 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:44:55.050 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:44:55.050 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:44:55.113 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 05:44:55.114 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 05:44:55.115 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 05:44:55.116 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:44:55.152 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 05:44:55.153 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 05:44:55.153 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:44:55.154 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:44:55.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:44:55.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:44:55.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:44:55.157 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:44:55.158 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:44:55.159 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:44:55.159 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:44:55.161 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 05:44:55.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:4f:08:db:01:f3:4f:66:63:32:b5:81:c8:9d:a4:c1:4f:15:da:b8] modulus: beb86cea2425b691fbe1dad62b11743781609e4fe3d531b2910da22ea391fcbe23d22107aa988f157a06c862515a95fb8cd6789997cf1cdc9e3474c96b1634ee3d4225c95e95de4073b7e36efdf9c2e8c217d38808c1b989f63a978ad17584506c4c203538fe38e7370207ca1dee2118fed68e4e9f5d8d2e46fdc481f1092f51ef396b31500101316a3e733b6410a291271da619025aec4e649c983f522ffca2544d6dd0504d49be5ae5f6f125b97ac19ce01640707b0e57adb91cf2b60615bb9bc7095de33985477159a8e1fc96b204a30d3655b9f40e649c0e495b4f003aa3b8a51b25f6daa31b1fcfc23bdfec657f24c4acaa329ab44c4c377812dc00764d public exponent: 10001 ] 2022-01-04 05:47:35.252 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 05:47:35.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 05:47:35.255 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:47:35.256 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 05:47:35.256 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:47:35.257 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 05:47:35.257 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 05:47:35.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 05:47:35.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 05:47:35.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 05:47:35.262 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 05:47:35.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:47:35.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:47:35.264 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:47:35.416 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 05:47:35.417 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 05:47:35.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 05:47:35.418 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:47:35.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 05:47:35.420 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 05:47:35.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:47:35.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:47:35.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:47:35.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:47:35.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:47:35.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:47:35.446 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:47:35.446 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:47:35.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:47:35.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 05:47:35.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 91dbf391093263e148cf5d7bd88ca698a6a27a832e385725477a45661eeb59e566cfe7c84d782320ea9e9373c6fc70e0ff4c17c5ae08514b1d94f6979a1c948b4d5094d9321fef147336b2be09fe9d1e35916756ad99ddeb5f3bb0dc0c91b8e595aa807a16ad19d105c162598d07542f0b68a275abe52f8c6b17fb3e891fbfb3f684f1e0b1af72632083bab68e8401d1a016a55fdb3a23da562d7084649d50d5d0acdb30f97de5e2ddc44dcf8c22730aa398e6d2116f70220041e3918467b8b0232e585d5accc1fa358ee8b050b3ecc37bfa38292f5b6c2cc70698fee268a09b8a794591fc3dd469f1411dd921fe1535cd20a6417dd15270f4b82129f3f852b29cea0cb86478df6052000614fd7acdb4f13fa65717d976296aeb32a3f5abda6f1d861eb6214f046804b4a72c5143b1e79e16b9040b490bd1cc020a9b8c19d8b9f954ff5bc17142385a71191aceaecc143fc3222b6271ff10279ddd3b2abdf390eb03162f581a17fb15033ea1276291913a9db05a035001097bf7e2a916c4d313 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:1e:75:70:57:e3:9b:86:dd:95:9d:24:ad:35:cb:24:c0:d1:68:29] modulus: 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 public exponent: 10001 ] 2022-01-04 05:50:38.418 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 05:50:38.420 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 05:50:38.422 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:50:38.423 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 05:50:38.423 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:50:38.424 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 05:50:38.424 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 05:50:38.425 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 05:50:38.425 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 05:50:38.425 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 05:50:38.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 05:50:38.451 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:50:38.452 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:50:38.452 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:50:38.543 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 05:50:38.545 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 05:50:38.546 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 05:50:38.546 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:50:38.548 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 05:50:38.549 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 05:50:38.549 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:50:38.550 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:50:38.550 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:50:38.551 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:50:38.551 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:50:38.552 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:50:38.552 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:50:38.553 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:50:38.553 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:50:38.554 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 05:50:38.558 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:3c:26:01:f5:6e:96:1e:f2:9b:a4:c9:95:28:6a:83:58:c2:e7:55] modulus: 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 public exponent: 10001 ] 2022-01-04 05:54:02.572 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-01-04 05:54:02.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-01-04 05:54:02.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:54:02.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-04 05:54:02.575 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-04 05:54:02.576 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-01-04 05:54:02.576 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-01-04 05:54:02.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-01-04 05:54:02.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-01-04 05:54:02.577 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-01-04 05:54:02.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-01-04 05:54:02.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:54:02.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-01-04 05:54:02.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:54:02.655 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-01-04 05:54:02.656 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-01-04 05:54:02.657 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-01-04 05:54:02.657 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-01-04 05:54:02.659 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-01-04 05:54:02.660 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-01-04 05:54:02.660 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:54:02.661 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:54:02.661 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:54:02.662 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:54:02.662 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:54:02.663 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:54:02.663 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-04 05:54:02.664 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-01-04 05:54:02.664 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-01-04 05:54:02.665 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-04 05:54:02.668 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 442256502405624828906450677515469921471925856002 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 04 02:18:29 UTC 2022 Final Date: Sun Jan 04 02:18:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [36:42:db:01:15:07:23:3b:2c:d1:2c:98:3f:a7:c1:9f:26:a3:4e:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd29da3031c8aa604f71bc572960b47960422b2 3401ce57f709c0da13a2d31808467a140847a1bf 8b59fda76cd81a2d72852b72a85408f972bcb0c5 0722b698518f4e0c588c93a1ff57922f1cd8973f 070c69ee24e43764d8d8d9b361ca7bb898d17a7b 8bc18b24f5d24eaed53257f0a5aa28c64f686097 d23d3e4c48aaa4eb7ea7374250d49c35f86c7665 8b0eb6742cd489d08e15b2f59cd511cec8e2b5d5 8febc93dac8560510cb069abcb55b9bb04a24d34 769fd5afe3724409e7251933b8d6aaa065bb96e6 1c8ccd0bd0c90034c2da29a0d9eb33938a66e808 9519a0314e1ca28fbf6e13b5d987fe409928069b 732f94de65ed8fef1f429dd823a77e2506825d1f 156ec576789033770aae49509bc1ca0e41fdcb26 97bf9b3edf986859bbe2e430e329c4e138c970cc 12b6522a48b31fbe7f0c70c131313f6500912a32 8de6efc1bcae47d65583ea20c5a29982556ba455 89e7f0ed669463b0b86a40008e98b9ae67104a3e badd0074b5dd86fcbfe169445d27576a05a4caa0 ddf438db Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:c6:d1:61:f7:9c:fb:a6:77:8b:e3:79:6c:88:fb:7b:a7:b0:b9:bf] modulus: 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 public exponent: 10001 ]