By type
2022-05-13 11:34:58,611 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-13 11:35:03,504 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-13 11:35:06.503 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 13, 2022 11:35:16 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 13, 2022 11:35:16 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 13, 2022 11:35:16 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 13, 2022 11:35:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-13 11:35:18.801 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-13 11:35:20.313 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-13 11:35:21.095 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-13 11:35:24.212 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-13 11:35:24.215 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-13 11:35:24.217 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-13 11:35:24.300 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-13 11:35:24.501 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-13 11:35:24.504 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-13 11:35:25.000 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-13 11:35:30.003 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 13, 2022 11:35:33 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-13 11:35:34.816 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.815 seconds (JVM running for 47.674) May 13, 2022 11:35:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-13 11:36:39.208 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 11:36:39.294 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 11:36:39.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-13 11:36:39.395 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 11:36:39.503 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-13 11:36:39.505 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 11:36:39.505 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 11:36:39.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 11:36:39.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 11:36:39.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 11:36:39.596 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 11:36:39.600 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 11:36:39.803 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 11:36:39.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 11:36:39.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 11:36:39.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 11:36:41.160 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 11:36:41.162 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 11:36:41.162 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 11:36:41.163 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 11:36:41.169 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 11:36:41.169 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 11:36:41.170 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 11:36:41.170 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 11:36:41.170 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 11:36:41.195 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 11:36:41.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 11:36:41.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 11:36:41.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 11:36:41.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 11:36:41.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 11:36:41.203 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 11:36:41.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:bb:cc:e4:37:fb:87:3d:28:23:99:c3:03:b3:53:36:88:f4:a8:0d] modulus: a9c21a8cce4f2704f9079cecd6f7b553e37715aa0614855d19d2e23d3f0e63bed7ad73f79f477a0fd8af5c2afaa2afe4e28aa7456031ed13b2a41feef0e9bb649c188323e42760fd7a1116b624f2b48ea515127ead96b2397f6784244676eb19a8ace23a65bd80ae33b4021945771033e557587023457c144f6e7cf4299d379296e2cfb8336b760f102b94132318398e1557b355ae4c6d73f21a7e80ad40cf737affdec9352fe95c8feb62b3e4eeaffc0027c5534f3924b3726e7e59a84330efa2ec7c42234a2fb571efddae9a1b820d4f7af52bcc44202cadafa14be0679368a82dde9cb031b3ed03da7b0b773d8c69615fc976197e19983fdd0363eed576a9 public exponent: 10001 ] 2022-05-13 13:39:59.499 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 13:39:59.500 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 13:39:59.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 13:39:59.504 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 13:39:59.505 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 13:39:59.506 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 13:39:59.506 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 13:39:59.507 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 13:39:59.507 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 13:39:59.508 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 13:39:59.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 13:39:59.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:39:59.606 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:39:59.606 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:39:59.854 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 13:39:59.855 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 13:39:59.855 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 13:39:59.855 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:39:59.860 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 13:39:59.860 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 13:39:59.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:39:59.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:39:59.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:39:59.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:39:59.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:39:59.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:39:59.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:39:59.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:39:59.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:39:59.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 13:39:59.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:cd:87:c2:7c:c4:c9:f9:06:bb:7b:24:a1:e1:42:b5:b6:73:c7:a8] modulus: a969646785d8e6eec3280eac738290305312cd4d98724cb84881f8a82de0f15a277ef526d90c356a62125e6ec5a356173db2c33616bfaffdc9e11e5d3b42dcf0753dd9f28383ff858223d61f7dff4bdda5a2ec4a462eb126ce72ee36cb5f03ea31b266faeeea45197773400ef8d2b58a2760fcd1c9c8e9b688ed064dce59b7eea3ad9cf1f4e8cf1ff6a3a5c4e082f70630e3f3fd4e97bc596ce1ea2919198d00f5e68b12ff6b3c628f6f8b144df7969215dc3bfdeeaf8130192c756f37e5b6084aba5d36e8da54d891ee45fd7a5a4face43a2fd7a3fa262c528cac762a6e65b300a5a42276bd0139c95f2fc300a81dcda61ea9c376503fd175abc082f5cae979 public exponent: 10001 ] 2022-05-13 13:43:46.196 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 13:43:46.197 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 13:43:46.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 13:43:46.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 13:43:46.201 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 13:43:46.201 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 13:43:46.202 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 13:43:46.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 13:43:46.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 13:43:46.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 13:43:46.208 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 13:43:46.208 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:43:46.208 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:43:46.208 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:43:46.423 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 13:43:46.424 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 13:43:46.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 13:43:46.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:43:46.427 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 13:43:46.428 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 13:43:46.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:43:46.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:43:46.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:43:46.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:43:46.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:43:46.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:43:46.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:43:46.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:43:46.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:43:46.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 13:43:46.436 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: e36b8712d25d4f3b4697d75c26547d36730ef5851eec3bb791f884621e2f0ab8be819bb155cd65205dbf0e5a24e4b7679103bb6c54a868a5d85f723095dc97398d31f2c78633db1cf780ddabb6a287b568b241fada3e79cfec601d28aedf03f7e661cdbbb4254669d03aa555b2b1b77005132205ff3bd838ae20cca8404a7ac36dd02433bd8913bd316815e74b058761c2db1f7735e1cbc02df3f474ce5e20a53612ae335df8bdb0ed9c7e6624f5dae0ef38cc237a6e43c52e849bc01938307398658ac047688602f62c201a88077c2c7785cf798da540facb8374f0137ddb14bdcf2491e1a8e593167718615cb4253dff55345333c670f3c0dc344e6adbf5f27817adcf4a5c13619af8476d7525810e11ec1ab9537fdacec0c823577f58e6cc56783220dc0dc487301defbb7f231bcf71437de348b8cbde7e8b1efe5f00fc2fd43cfa8b3a5323036c4dcfe5a2bc60ef396392fdd9653ee094ecc2c8a6b96784a7fa9f03afff2260e06e8ceaf0cf204e971ee87dc0b742eea3e34578a86ce319 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:fd:0e:76:60:b7:52:b2:a2:42:23:0b:3b:44:35:0a:f6:a1:f1:26] modulus: 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 public exponent: 10001 ] 2022-05-13 13:45:57.625 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 13:45:57.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 13:45:57.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-13 13:45:57.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 13:45:57.632 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-13 13:45:57.632 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 13:45:57.633 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 13:45:57.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 13:45:57.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 13:45:57.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 13:45:57.697 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 13:45:57.698 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:45:57.698 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:45:57.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:45:57.801 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 13:45:57.801 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 13:45:57.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 13:45:57.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:45:57.803 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 13:45:57.804 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 13:45:57.804 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:45:57.804 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:45:57.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:45:57.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:45:57.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:45:57.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:45:57.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:45:57.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:45:57.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:45:57.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 13:45:57.811 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:63:67:94:18:47:35:8f:1b:19:6e:74:8b:07:fa:28:1b:d9:7e:df] modulus: d16dce23c5298b047e7d26ee13a96af4ff5c2e77dc6352f865d91b80c0673ab6eaa8165e4dd1889b08527abebc5331c5bfe5a0afe674156dad6586fcc4e5922838e0d513e4f6b96d0943efa7c4743910c7bd33cc09065b23476ef278b8d7d7dc22b43e1d14889396e9635db23ffab64462ea7c468119b6cfde926fcb4507cbe4416c37db1f71add02018c4dd8e37b2bf7870bbc1868e21709ca9b35c579db98b07a1650615763a8b21654b1b5d5a14c367b9a24b6a203638857cee04e11676a6fd6d1ad296c5e8c082a2cdd814cd91684ac2cf3114b8450e024e9353aaff435c14d12ff87bb726e148ff7091ada803cf53278fd476a4286da7e5484747d4e16b public exponent: 10001 ] 2022-05-13 13:49:15.738 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 13:49:15.740 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 13:49:15.742 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-13 13:49:15.743 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 13:49:15.744 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-13 13:49:15.744 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 13:49:15.745 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 13:49:15.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 13:49:15.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 13:49:15.747 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 13:49:15.751 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 13:49:15.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:49:15.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:49:15.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:49:15.905 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 13:49:15.906 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 13:49:15.907 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 13:49:15.907 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:49:15.910 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 13:49:15.911 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 13:49:15.911 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:49:15.912 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:49:15.912 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:49:15.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:49:15.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:49:15.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:49:15.914 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:49:15.915 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:49:15.915 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:49:15.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 13:49:15.919 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:e7:16:74:31:44:7d:ed:84:4d:44:11:39:c5:e0:32:aa:89:e0:8d] modulus: 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 public exponent: 10001 ] 2022-05-13 13:53:26.576 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 13:53:26.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 13:53:26.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 13:53:26.579 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 13:53:26.579 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 13:53:26.580 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 13:53:26.580 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 13:53:26.581 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 13:53:26.581 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 13:53:26.581 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 13:53:26.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 13:53:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:53:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:53:26.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:53:26.691 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 13:53:26.692 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 13:53:26.692 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 13:53:26.693 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:53:26.695 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 13:53:26.695 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 13:53:26.702 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:53:26.703 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:53:26.703 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:53:26.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:53:26.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:53:26.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:53:26.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:53:26.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:53:26.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:53:26.707 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 13:53:26.711 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: e36b8712d25d4f3b4697d75c26547d36730ef5851eec3bb791f884621e2f0ab8be819bb155cd65205dbf0e5a24e4b7679103bb6c54a868a5d85f723095dc97398d31f2c78633db1cf780ddabb6a287b568b241fada3e79cfec601d28aedf03f7e661cdbbb4254669d03aa555b2b1b77005132205ff3bd838ae20cca8404a7ac36dd02433bd8913bd316815e74b058761c2db1f7735e1cbc02df3f474ce5e20a53612ae335df8bdb0ed9c7e6624f5dae0ef38cc237a6e43c52e849bc01938307398658ac047688602f62c201a88077c2c7785cf798da540facb8374f0137ddb14bdcf2491e1a8e593167718615cb4253dff55345333c670f3c0dc344e6adbf5f27817adcf4a5c13619af8476d7525810e11ec1ab9537fdacec0c823577f58e6cc56783220dc0dc487301defbb7f231bcf71437de348b8cbde7e8b1efe5f00fc2fd43cfa8b3a5323036c4dcfe5a2bc60ef396392fdd9653ee094ecc2c8a6b96784a7fa9f03afff2260e06e8ceaf0cf204e971ee87dc0b742eea3e34578a86ce319 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:38:ad:47:de:6b:00:25:98:b9:d5:ad:84:ff:85:dc:2b:2f:dc:91] modulus: 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 public exponent: 10001 ] 2022-05-13 13:58:39.884 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 13:58:39.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 13:58:39.886 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-13 13:58:39.886 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 13:58:39.887 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-13 13:58:39.889 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 13:58:39.890 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 13:58:39.890 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 13:58:39.890 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 13:58:39.890 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 13:58:39.893 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 13:58:39.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:58:39.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 13:58:39.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:58:39.995 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 13:58:39.996 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 13:58:39.997 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 13:58:39.997 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 13:58:40.000 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 13:58:40.000 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 13:58:40.001 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:58:40.001 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:58:40.002 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:58:40.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:58:40.004 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:58:40.004 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:58:40.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 13:58:40.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 13:58:40.007 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 13:58:40.008 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 13:58:40.011 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:db:54:d9:ca:e5:97:1b:1b:59:91:33:0f:cf:b8:e2:aa:8d:92:74] modulus: da8535a3e88cdc729aa1185e6ecaa6646a3df089149f40bf01b38da57acc978516bc6e69ce18f2381d0e2ae7172fc79679bf44b90021899f06650b0a3b58256a80dc2ed7e63b01c681148683f824d1ad3e77bf5ce76bf44f108fdc290e3e281615e3b00ef2f3045265e82fa1f1c386412591cbb2e9e7c4572e1972f7e2b2462e514a12eb59aca46fec9c04fe31a19c8ed5ec6767a0bc31848668d26740e902cfc3b09fc9c519e3af78ba64e0c09d3becef885657ae979f6c3caf7efcc7b3f6f08946a356cd9487db930e00f9c29a3b0f9cef8a34c89f69b4634ddbac2b27ef0f43dd7ac9c799a17d432a81c5e4652d80b244b76232d7afb4bc4fbd3d65ed2591 public exponent: 10001 ] 2022-05-13 14:00:28.193 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:00:28.194 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:00:28.196 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:00:28.197 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:00:28.197 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:00:28.198 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:00:28.198 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:00:28.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:00:28.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:00:28.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:00:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:00:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:00:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:00:28.206 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:00:28.313 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:00:28.314 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:00:28.314 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:00:28.314 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:00:28.315 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:00:28.316 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:00:28.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:00:28.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:00:28.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:00:28.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:00:28.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:00:28.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:00:28.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:00:28.318 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:00:28.318 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:00:28.319 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:00:28.321 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:a7:5b:09:24:c5:e0:bd:09:8c:25:68:02:93:10:75:e7:10:eb:69] modulus: d6c9ee3b0fa93f85c6177fcdb7fa61c34cd1279a14b53c1ace232c0c52cb83aae228fb30d74c986aea27e34b580a7007e495cdfc034196dd1d560717c25b4795ccbaab9657f901cb0b5e36082c95c9b3e064773e510561257bdeba34387a08f0e59c0350e638f2e352a64d0d4cc3159cff7200a50da38da2d2dcace173bac6fd395675a89745d29dfe2833ddc7cb8ecc0d3e701b3fdfa5d43371300d6b789e06c3032b7dc4bdf942eb94a65b50f174a3d6357cc8c4d8782ae4a8414c7ed0225ca106713a8cef5f32023f80654761188be41e4411d3a76e5100831d7c7c6c4600a91cf3ccc84eb55861e041550b20404a10516f6d675722b6cea05db0a5b60161 public exponent: 10001 ] 2022-05-13 14:05:06.024 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:05:06.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:05:06.027 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:05:06.028 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:05:06.028 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:05:06.030 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:05:06.030 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:05:06.030 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:05:06.030 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:05:06.031 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:05:06.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:05:06.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:05:06.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:05:06.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:05:06.135 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:05:06.135 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:05:06.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:05:06.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:05:06.138 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:05:06.138 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:05:06.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:05:06.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:05:06.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:05:06.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:05:06.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:05:06.141 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:05:06.141 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:05:06.142 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:05:06.142 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:05:06.143 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:05:06.148 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:f8:37:a8:0e:55:46:5c:d6:81:72:9d:5e:6f:29:02:00:a9:ff:ea] modulus: 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 public exponent: 10001 ] 2022-05-13 14:07:33.769 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:07:33.770 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:07:33.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-13 14:07:33.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:07:33.772 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-13 14:07:33.773 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:07:33.773 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:07:33.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:07:33.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:07:33.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:07:33.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:07:33.779 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:07:33.779 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:07:33.779 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:07:33.891 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:07:33.891 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:07:33.891 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:07:33.891 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:07:33.892 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:07:33.893 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:07:33.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:07:33.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:07:33.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:07:33.894 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:07:33.894 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:07:33.894 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:07:33.894 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:07:33.894 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:07:33.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:07:33.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:07:33.898 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:73:6e:df:84:c5:d0:18:f6:91:d5:b8:e4:2b:0c:94:1c:da:d6:4f] modulus: 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 public exponent: 10001 ] 2022-05-13 14:09:08.065 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:09:08.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:09:08.068 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-13 14:09:08.069 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:09:08.069 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-13 14:09:08.069 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:09:08.070 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:09:08.070 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:09:08.070 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:09:08.071 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:09:08.076 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:09:08.076 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:09:08.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:09:08.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:09:08.190 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:09:08.191 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:09:08.191 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:09:08.191 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:09:08.192 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:09:08.192 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:09:08.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:09:08.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:09:08.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:09:08.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:09:08.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:09:08.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:09:08.193 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:09:08.193 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:09:08.193 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:09:08.193 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:09:08.195 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: e36b8712d25d4f3b4697d75c26547d36730ef5851eec3bb791f884621e2f0ab8be819bb155cd65205dbf0e5a24e4b7679103bb6c54a868a5d85f723095dc97398d31f2c78633db1cf780ddabb6a287b568b241fada3e79cfec601d28aedf03f7e661cdbbb4254669d03aa555b2b1b77005132205ff3bd838ae20cca8404a7ac36dd02433bd8913bd316815e74b058761c2db1f7735e1cbc02df3f474ce5e20a53612ae335df8bdb0ed9c7e6624f5dae0ef38cc237a6e43c52e849bc01938307398658ac047688602f62c201a88077c2c7785cf798da540facb8374f0137ddb14bdcf2491e1a8e593167718615cb4253dff55345333c670f3c0dc344e6adbf5f27817adcf4a5c13619af8476d7525810e11ec1ab9537fdacec0c823577f58e6cc56783220dc0dc487301defbb7f231bcf71437de348b8cbde7e8b1efe5f00fc2fd43cfa8b3a5323036c4dcfe5a2bc60ef396392fdd9653ee094ecc2c8a6b96784a7fa9f03afff2260e06e8ceaf0cf204e971ee87dc0b742eea3e34578a86ce319 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:f3:ac:f7:c5:ba:80:57:a8:a4:9d:6a:70:b1:16:71:d1:63:01:bc] modulus: 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 public exponent: 10001 ] 2022-05-13 14:12:59.879 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:12:59.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:12:59.881 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:12:59.881 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:12:59.882 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:12:59.882 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:12:59.882 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:12:59.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:12:59.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:12:59.883 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:12:59.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:12:59.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:12:59.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:12:59.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:13:00.011 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:13:00.011 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:13:00.012 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:13:00.012 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:13:00.012 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:13:00.013 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:13:00.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:13:00.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:13:00.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:13:00.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:13:00.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:13:00.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:13:00.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:13:00.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:13:00.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:13:00.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:13:00.016 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:2a:a3:9b:74:ec:b6:73:9a:1c:20:12:ac:63:3b:dd:c8:d8:b5:d5] modulus: 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 public exponent: 10001 ] 2022-05-13 14:19:59.225 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:19:59.226 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:19:59.227 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:19:59.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:19:59.228 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:19:59.228 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:19:59.228 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:19:59.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:19:59.229 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:19:59.229 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:19:59.233 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:19:59.233 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:19:59.234 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:19:59.234 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:19:59.363 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:19:59.364 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:19:59.364 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:19:59.364 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:19:59.366 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:19:59.367 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:19:59.367 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:19:59.368 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:19:59.368 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:19:59.369 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:19:59.369 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:19:59.369 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:19:59.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:19:59.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:19:59.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:19:59.396 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:19:59.400 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:7d:fe:6d:0e:a2:d6:11:4d:a5:31:ce:82:95:1a:44:bc:32:12:96] modulus: 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 public exponent: 10001 ] 2022-05-13 14:26:42.616 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:26:42.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:26:42.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:26:42.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:26:42.620 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:26:42.620 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:26:42.620 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:26:42.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:26:42.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:26:42.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:26:42.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:26:42.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:26:42.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:26:42.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:26:42.725 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:26:42.725 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:26:42.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:26:42.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:26:42.728 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:26:42.729 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:26:42.729 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:26:42.730 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:26:42.730 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:26:42.731 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:26:42.731 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:26:42.731 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:26:42.732 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:26:42.732 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:26:42.732 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:26:42.733 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:26:42.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 719634843001109182812564540155713640459403978228 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:31:24 UTC 2022 Final Date: Wed May 12 11:31:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:1a:23:94:b6:21:ed:9a:40:7f:3c:1b:07:9d:8c:f5:ce:a9:0b:f1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58979d5c6eb98ab2e955e2fc518c66fb30e5a1bd 43ee80cf5e1e1d9dc968140815b49160aa5f4eb8 a7e41cd95ca33c8e96462a4e61b90fbdd86dbffc 3a009462fcb6824e8723b9b4b0bcb3aa8b1efbf3 d5f4f210f90f6d0e8ed538354b7e77b4dadbe0a4 30db5708add4adc3006d25c21db2d3958e5fff2a 3737696c3e0026d9126542ad2982dfa20c05a994 938f6d46a54a3424bc11abd9e65cb4b58adae5fa 70722236742c5d10013e9c0707ffb8b94c9f0dc2 61fa91fe74ba02914ffe0192d89df37dfeff8925 71025a01c3fac121cc11a0af903b3b2551a157dd eb2b7b579e9ca3f29968a215e36a630a64a81eb3 e9b0dbc3de397e193e21406ed40f6d2369b5f3fc 47e4fe471ec1b3a71c6b621600d04476ee4eae6b 74827528ad8082ace5210e7e05e26ad7bcdc8df0 3cf5cdeb5fe9ffc4b5e6c2a88d0fca95aea1a936 9cda8e21a0a360cafa78aecc7cdba77cfeb2cf41 b532bec482bbf50fa22dec1fa77f7a458215e2ac de1accde67665f481bea50a36d998b50ee76fe64 575811aa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:34:d4:c5:de:f3:ff:9a:3b:60:48:fe:c0:70:e0:a8:99:09:f3:74] modulus: a835adf4310a8dd63b7067598085092a96292e51f701e7a0ab57d26304be0e287739757bae807b33f7eef93a43d2fb717f72a836f0cf2bee34b69e24543ad400077affcabbaf1dba19f205d8916eecd5328bbc913f07e89aaaa352b624ccfe5819f5deb1b3b9bcf0d340377442dd18a62b60f683a490a0ed621e3e2fd8412469d89da8c337bdd5a6be3736f0bc265e689b60cc0980b6f6448e86415e7fb54f8c42a8e3824711c614d281a636f5f92682199e61a84a86a1e349a558445d107d6e71f5175c2139da87b8f29bb59d5378d9ed3903cd86072c992984b19a4f73e7e5cf175906b01035325be9cb223f87ee8fd6bd67e75599aa9ce0310fc82118eae7 public exponent: 10001 ]