By type
2022-06-03 08:52:57,330 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-03 08:52:58,433 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-03 08:52:59.436 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 03, 2022 8:53:01 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 03, 2022 8:53:01 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 03, 2022 8:53:01 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 03, 2022 8:53:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-03 08:53:02.659 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-03 08:53:03.028 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-03 08:53:03.219 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-03 08:53:04.076 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-03 08:53:04.079 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-03 08:53:04.082 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-03 08:53:04.086 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-03 08:53:04.129 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-03 08:53:04.133 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-03 08:53:04.283 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-03 08:53:05.183 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 03, 2022 8:53:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-03 08:53:06.593 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.191 seconds (JVM running for 12.536) Jun 03, 2022 8:53:32 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-03 08:53:48.349 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 08:53:48.360 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 08:53:48.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 08:53:48.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 08:53:48.446 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 08:53:48.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 08:53:48.451 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 08:53:48.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 08:53:48.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 08:53:48.459 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 08:53:48.468 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 08:53:48.473 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 08:53:48.522 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 08:53:48.527 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 08:53:48.528 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 08:53:48.531 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 08:53:49.165 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 08:53:49.171 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 08:53:49.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 08:53:49.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 08:53:49.184 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 08:53:49.185 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 08:53:49.186 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 08:53:49.187 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 08:53:49.187 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 08:53:49.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 08:53:49.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 08:53:49.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 08:53:49.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 08:53:49.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 08:53:49.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 08:53:49.213 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 08:53:49.242 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:94:36:10:c3:b3:92:15:19:e2:65:5f:b8:0d:55:51:c4:bf:b8:b6] modulus: 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 public exponent: 10001 ] 2022-06-03 11:15:54.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:15:54.653 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:15:54.661 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:15:54.663 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:15:54.664 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:15:54.666 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:15:54.666 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:15:54.667 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:15:54.668 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:15:54.669 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:15:54.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:15:54.680 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:15:54.681 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:15:54.682 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:15:54.952 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:15:54.953 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:15:54.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:15:54.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:15:54.959 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:15:54.960 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:15:54.960 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:15:54.961 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:15:54.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:15:54.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:15:54.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:15:54.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:15:54.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:15:54.967 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:15:54.967 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:15:54.968 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:15:54.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0e:c2:df:28:fe:9e:3e:92:c9:c5:37:21:6c:81:23:42:65:18:d7:5e] modulus: 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 public exponent: 10001 ] 2022-06-03 11:18:51.560 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:18:51.562 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:18:51.565 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:18:51.566 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:18:51.567 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:18:51.568 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:18:51.569 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:18:51.569 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:18:51.570 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:18:51.571 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:18:51.587 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:18:51.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:18:51.594 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:18:51.599 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:18:51.832 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:18:51.833 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:18:51.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:18:51.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:18:51.838 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:18:51.838 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:18:51.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:18:51.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:18:51.840 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:18:51.842 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:18:51.842 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:18:51.843 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:18:51.844 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:18:51.844 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:18:51.845 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:18:51.846 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:18:51.851 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: d5887493b0075362a9195f326b43ced50f5e16ca48fa69be5b59290d5413cf4d1335916a0246c1a845ddf7dbd7029e309d60bd37b43dd5e54b3b61418d15550eb23bd9eef49e3a36210b68adb2493c820c5117e052ba12c9f1c0d3d89fdf0376b1b8d9b878384bbb1d5ebe998f423992fb5669174b3f650a4d7223350d70542071f993b78a653361c90fc4d3d6b4a7fd4a9850250a6f8a0e4091b393c647374954b7254333cdc7bab947c521ca2ae0b5051236eb343355ebcd148a064fa4582548d5a6cfffe9756b07af0150060274ca503c8728e972a352270d9ac3c942c10728d2dff906f54e7e590514bcc16ab4428ff1cd6f3ff36c32b76501556fd1eefe83f3219290e2545c6884f95097828117f7e53d43c94a2f33e70d28f9d9bee63cf1adf3562f406def2cc98f3cd773d9a88ccce6b915900dc2a723e02a8828baa421f6b202d365e2fea67e967ff3d0a6557c5b021cd776e55ff9de1d96a633ddf5f5071a28f11416d03311d4dce96340c222508aa417cb5da75b1fbced3b83d903 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:d7:ea:11:e1:a9:29:80:50:fb:59:5b:d6:4a:44:e4:81:43:94:42] modulus: c75bb3bcb8ae713961f0fbba4a00439d075ad965f6a51143507d0e6fbbe80fd1df89b808e03b1f3f0c8a4ce74a58bab8d45b13c190253a76bf831cfcf819dfd17b107aef5ec7c83571c489fec2d2e794d07614b541f160406d05d09d12df66ac282fb0463bf1bb3d0d575f29dd6296895f8416ace0883b3b1de68ed0fdd93c22a57e9c8622b339eb607c62be56434eee6cfc4c2ffc54a8660055bbc0406f1f5f34946f54c716c4af02731b4cd00ff966bbce5ed1269f4a51c187e9dd5f3d51ecd33619e81bcfbdd5c0c78b8cf02c9fc573443e11c79f4fcd6845e8926a3843d932b58bc9c3ea505fb31a82be8c96d9a31c714b25b71399a5a760f6c581d5fd2f public exponent: 10001 ] 2022-06-03 11:20:10.528 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:20:10.529 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:20:10.531 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 11:20:10.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:20:10.533 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 11:20:10.534 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:20:10.534 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:20:10.535 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:20:10.536 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:20:10.536 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:20:10.542 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:20:10.543 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:20:10.543 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:20:10.543 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:20:10.745 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:20:10.746 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:20:10.746 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:20:10.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:20:10.752 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:20:10.752 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:20:10.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:20:10.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:20:10.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:20:10.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:20:10.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:20:10.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:20:10.759 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:20:10.759 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:20:10.760 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:20:10.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:20:10.768 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:2c:46:24:2f:7f:d8:fb:b4:53:79:9d:9d:72:78:60:6b:b7:99:ae] modulus: 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 public exponent: 10001 ] 2022-06-03 11:21:52.547 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:21:52.549 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:21:52.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 11:21:52.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:21:52.553 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 11:21:52.554 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:21:52.554 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:21:52.555 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:21:52.555 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:21:52.556 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:21:52.560 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:21:52.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:21:52.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:21:52.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:21:52.718 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:21:52.718 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:21:52.719 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:21:52.719 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:21:52.722 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:21:52.723 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:21:52.723 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:21:52.724 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:21:52.724 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:21:52.725 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:21:52.725 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:21:52.725 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:21:52.726 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:21:52.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:21:52.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:21:52.728 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:21:52.733 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:44:32:49:fc:ea:a7:0b:b0:7a:26:7f:75:f0:bf:25:4e:4c:0e:74] modulus: b99dfc4670fbe16b67eaad18ba92a89ba633d2563426e9426d9d46529d75d18ba9ed7f77682835bed999fcf7cbc73a5084369517edc4da11497125def3e588bd6caac4501330890242d87ca4a273161b4ae50cf08ca483ce7bf84e9a8c4a4d2a2d58172b450ead4c1dc44dcfa70e1214e69ba82a175a97beb191689860d53a4019468676d8d8c12bb0b800e137f94b2aa5a5e3e01df2b9daabe7ab2cd4433216e03c76ef1a246a34f528dcb11774991dca6d370599930cd3179e9761d9b7d914ebc2a07df48f11f980475e087ab071594ecd3ff2e6035f0205ccccdc26faa8115762dfd3d36e22c06cec9fdc150d57237a00168b74be9f87a6fa6c4f57d9e0b7 public exponent: 10001 ] 2022-06-03 11:24:17.735 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:24:17.739 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:24:17.743 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:24:17.745 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:24:17.745 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:24:17.746 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:24:17.746 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:24:17.747 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:24:17.748 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:24:17.748 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:24:17.757 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:24:17.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:24:17.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:24:17.760 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:24:17.945 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:24:17.946 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:24:17.947 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:24:17.947 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:24:17.949 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:24:17.950 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:24:17.950 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:24:17.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:24:17.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:24:17.952 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:24:17.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:24:17.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:24:17.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:24:17.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:24:17.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:24:17.956 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:24:17.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:af:da:95:65:d1:87:0d:61:f2:88:12:2b:8c:ce:59:14:b6:c3:ed] modulus: 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 public exponent: 10001 ] 2022-06-03 11:29:05.718 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:29:05.720 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:29:05.724 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:29:05.726 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:29:05.728 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:29:05.729 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:29:05.730 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:29:05.730 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:29:05.731 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:29:05.731 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:29:05.738 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:29:05.739 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:29:05.739 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:29:05.739 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:29:05.928 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:29:05.929 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:29:05.930 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:29:05.930 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:29:05.932 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:29:05.933 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:29:05.933 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:29:05.933 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:29:05.934 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:29:05.934 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:29:05.935 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:29:05.935 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:29:05.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:29:05.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:29:05.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:29:05.938 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:29:05.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:f5:93:42:88:d6:9e:92:e0:dc:5d:f8:49:85:fc:ef:b0:ec:83:8c] modulus: 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 public exponent: 10001 ] 2022-06-03 11:33:41.675 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:33:41.678 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:33:41.681 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:33:41.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:33:41.683 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:33:41.684 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:33:41.684 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:33:41.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:33:41.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:33:41.686 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:33:41.695 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:33:41.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:33:41.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:33:41.699 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:33:41.884 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:33:41.885 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:33:41.885 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:33:41.885 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:33:41.887 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:33:41.887 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:33:41.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:33:41.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:33:41.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:33:41.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:33:41.890 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:33:41.890 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:33:41.893 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:33:41.893 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:33:41.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:33:41.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:33:41.909 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:df:f4:af:bc:d0:6c:98:20:0d:34:bd:9c:49:2d:eb:6c:c0:1c:41] modulus: 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 public exponent: 10001 ] 2022-06-03 11:39:14.387 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:39:14.389 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:39:14.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:39:14.417 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:39:14.417 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:39:14.418 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:39:14.418 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:39:14.418 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:39:14.419 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:39:14.419 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:39:14.424 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:39:14.425 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:39:14.425 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:39:14.425 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:39:14.675 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:39:14.676 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:39:14.676 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:39:14.676 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:39:14.678 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:39:14.678 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:39:14.679 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:39:14.679 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:39:14.679 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:39:14.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:39:14.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:39:14.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:39:14.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:39:14.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:39:14.681 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:39:14.682 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:39:14.685 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:d0:09:0b:35:09:b0:4b:9e:da:5d:61:68:4b:2d:11:31:09:9c:ff] modulus: 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 public exponent: 10001 ] 2022-06-03 11:43:40.184 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:43:40.187 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:43:40.190 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:43:40.191 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:43:40.191 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:43:40.192 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:43:40.192 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:43:40.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:43:40.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:43:40.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:43:40.199 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:43:40.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:43:40.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:43:40.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:43:40.375 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:43:40.376 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:43:40.376 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:43:40.377 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:43:40.380 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:43:40.380 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:43:40.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:43:40.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:43:40.382 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:43:40.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:43:40.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:43:40.384 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:43:40.386 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:43:40.386 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:43:40.386 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:43:40.387 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:43:40.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:02:f4:2e:8f:38:d9:2b:7c:91:85:2f:d3:48:d4:85:f0:ae:f8:d5] modulus: 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 public exponent: 10001 ] 2022-06-03 11:48:26.628 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:48:26.629 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:48:26.631 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:48:26.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:48:26.632 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:48:26.632 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:48:26.633 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:48:26.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:48:26.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:48:26.634 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:48:26.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:48:26.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:48:26.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:48:26.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:48:26.809 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:48:26.810 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:48:26.811 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:48:26.811 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:48:26.813 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:48:26.813 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:48:26.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:48:26.814 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:48:26.814 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:48:26.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:48:26.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:48:26.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:48:26.816 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:48:26.816 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:48:26.816 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:48:26.817 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:48:26.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: d5887493b0075362a9195f326b43ced50f5e16ca48fa69be5b59290d5413cf4d1335916a0246c1a845ddf7dbd7029e309d60bd37b43dd5e54b3b61418d15550eb23bd9eef49e3a36210b68adb2493c820c5117e052ba12c9f1c0d3d89fdf0376b1b8d9b878384bbb1d5ebe998f423992fb5669174b3f650a4d7223350d70542071f993b78a653361c90fc4d3d6b4a7fd4a9850250a6f8a0e4091b393c647374954b7254333cdc7bab947c521ca2ae0b5051236eb343355ebcd148a064fa4582548d5a6cfffe9756b07af0150060274ca503c8728e972a352270d9ac3c942c10728d2dff906f54e7e590514bcc16ab4428ff1cd6f3ff36c32b76501556fd1eefe83f3219290e2545c6884f95097828117f7e53d43c94a2f33e70d28f9d9bee63cf1adf3562f406def2cc98f3cd773d9a88ccce6b915900dc2a723e02a8828baa421f6b202d365e2fea67e967ff3d0a6557c5b021cd776e55ff9de1d96a633ddf5f5071a28f11416d03311d4dce96340c222508aa417cb5da75b1fbced3b83d903 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:12:df:b4:43:69:34:3e:ef:96:54:e6:14:3d:49:08:b2:5b:c9:55] modulus: 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 public exponent: 10001 ] 2022-06-03 11:54:53.213 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:54:53.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:54:53.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:54:53.220 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:54:53.220 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:54:53.221 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:54:53.221 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:54:53.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:54:53.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:54:53.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:54:53.228 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:54:53.229 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:54:53.229 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:54:53.230 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:54:53.420 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:54:53.420 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:54:53.421 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:54:53.421 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:54:53.422 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:54:53.423 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:54:53.423 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:54:53.424 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:54:53.424 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:54:53.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:54:53.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:54:53.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:54:53.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:54:53.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:54:53.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:54:53.428 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:54:53.432 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:60:f6:5f:88:e4:04:6f:86:38:a3:a6:54:3c:99:62:9e:cb:2b:84] modulus: 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 public exponent: 10001 ] 2022-06-03 11:59:42.157 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 11:59:42.161 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 11:59:42.164 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:59:42.165 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 11:59:42.166 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 11:59:42.166 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 11:59:42.167 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 11:59:42.167 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 11:59:42.168 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 11:59:42.168 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 11:59:42.176 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 11:59:42.178 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:59:42.179 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 11:59:42.179 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:59:42.376 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 11:59:42.377 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 11:59:42.378 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 11:59:42.378 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 11:59:42.379 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 11:59:42.380 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 11:59:42.382 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:59:42.383 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:59:42.383 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:59:42.385 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:59:42.386 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:59:42.386 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:59:42.387 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 11:59:42.387 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 11:59:42.387 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 11:59:42.388 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 11:59:42.393 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:e3:eb:da:4d:3f:b9:26:14:1b:52:89:9d:ca:09:e2:33:3e:41:15] modulus: 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 public exponent: 10001 ] 2022-06-03 12:09:27.045 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:09:27.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:09:27.060 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:09:27.068 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:09:27.069 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:09:27.070 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:09:27.070 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:09:27.071 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:09:27.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:09:27.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:09:27.089 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:09:27.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:09:27.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:09:27.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:09:27.268 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:09:27.269 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:09:27.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:09:27.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:09:27.271 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:09:27.272 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:09:27.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:09:27.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:09:27.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:09:27.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:09:27.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:09:27.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:09:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:09:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:09:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:09:27.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:09:27.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:bb:4a:19:35:c3:80:64:ff:0b:26:12:f9:cf:dc:7a:a8:f5:ec:fa] modulus: b4b13e87a4072f58b0c63e5b11dcf409283e7b74017cd6102383d73af888524ef4e1fd283b405b7d0ef751844ef134e711b0d4f732854e0687d3a56117089d328762457d0d212c0b8ea52934249ec76e645b4ed54213894b2c1c6b55582dc6db84c1bc576d8e2809365962f00962b62a2f1f052f2fa4cccb1d879cf098ebb4786f946b2bff7b530da17446aed536f3fd86651c9ded5097f3ae40ae506ef6ff8169594cf36d5df37243b563d9b2d500c91732cd072ddc9034685163d048d662e840d9cc56dbc11487f43d464ff15c2762afd7b0a6ff2259b638f3ee456dcc29b49ffa57ec9d00b18515c157c93597d08357f390ca9e25edee16e9ccdf39017f37 public exponent: 10001 ] 2022-06-03 12:14:45.571 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:14:45.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:14:45.574 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:14:45.575 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:14:45.577 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:14:45.577 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:14:45.578 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:14:45.578 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:14:45.578 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:14:45.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:14:45.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:14:45.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:14:45.586 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:14:45.586 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:14:45.832 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:14:45.832 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:14:45.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:14:45.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:14:45.834 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:14:45.835 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:14:45.835 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:14:45.835 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:14:45.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:14:45.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:14:45.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:14:45.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:14:45.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:14:45.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:14:45.838 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:14:45.840 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:14:45.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: d5887493b0075362a9195f326b43ced50f5e16ca48fa69be5b59290d5413cf4d1335916a0246c1a845ddf7dbd7029e309d60bd37b43dd5e54b3b61418d15550eb23bd9eef49e3a36210b68adb2493c820c5117e052ba12c9f1c0d3d89fdf0376b1b8d9b878384bbb1d5ebe998f423992fb5669174b3f650a4d7223350d70542071f993b78a653361c90fc4d3d6b4a7fd4a9850250a6f8a0e4091b393c647374954b7254333cdc7bab947c521ca2ae0b5051236eb343355ebcd148a064fa4582548d5a6cfffe9756b07af0150060274ca503c8728e972a352270d9ac3c942c10728d2dff906f54e7e590514bcc16ab4428ff1cd6f3ff36c32b76501556fd1eefe83f3219290e2545c6884f95097828117f7e53d43c94a2f33e70d28f9d9bee63cf1adf3562f406def2cc98f3cd773d9a88ccce6b915900dc2a723e02a8828baa421f6b202d365e2fea67e967ff3d0a6557c5b021cd776e55ff9de1d96a633ddf5f5071a28f11416d03311d4dce96340c222508aa417cb5da75b1fbced3b83d903 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:ca:a5:3a:93:51:66:73:0b:d1:5c:8a:80:3c:72:0c:8d:31:a7:dc] modulus: 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 public exponent: 10001 ] 2022-06-03 12:24:35.116 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:24:35.119 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:24:35.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:24:35.123 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:24:35.123 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:24:35.124 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:24:35.124 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:24:35.125 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:24:35.126 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:24:35.126 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:24:35.132 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:24:35.133 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:24:35.133 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:24:35.134 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:24:35.314 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:24:35.315 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:24:35.315 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:24:35.316 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:24:35.317 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:24:35.318 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:24:35.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:24:35.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:24:35.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:24:35.319 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:24:35.319 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:24:35.320 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:24:35.320 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:24:35.320 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:24:35.321 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:24:35.322 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:24:35.326 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: d5887493b0075362a9195f326b43ced50f5e16ca48fa69be5b59290d5413cf4d1335916a0246c1a845ddf7dbd7029e309d60bd37b43dd5e54b3b61418d15550eb23bd9eef49e3a36210b68adb2493c820c5117e052ba12c9f1c0d3d89fdf0376b1b8d9b878384bbb1d5ebe998f423992fb5669174b3f650a4d7223350d70542071f993b78a653361c90fc4d3d6b4a7fd4a9850250a6f8a0e4091b393c647374954b7254333cdc7bab947c521ca2ae0b5051236eb343355ebcd148a064fa4582548d5a6cfffe9756b07af0150060274ca503c8728e972a352270d9ac3c942c10728d2dff906f54e7e590514bcc16ab4428ff1cd6f3ff36c32b76501556fd1eefe83f3219290e2545c6884f95097828117f7e53d43c94a2f33e70d28f9d9bee63cf1adf3562f406def2cc98f3cd773d9a88ccce6b915900dc2a723e02a8828baa421f6b202d365e2fea67e967ff3d0a6557c5b021cd776e55ff9de1d96a633ddf5f5071a28f11416d03311d4dce96340c222508aa417cb5da75b1fbced3b83d903 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:25:5e:bf:fc:20:96:5f:b8:8c:b4:cb:41:27:63:ef:ae:ca:d4:8d] modulus: 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 public exponent: 10001 ] 2022-06-03 12:26:45.899 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:26:45.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:26:45.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 12:26:45.905 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:26:45.905 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 12:26:45.906 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:26:45.906 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:26:45.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:26:45.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:26:45.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:26:45.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:26:45.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:26:45.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:26:45.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:26:46.086 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:26:46.087 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:26:46.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:26:46.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:26:46.089 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:26:46.089 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:26:46.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:26:46.091 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:26:46.091 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:26:46.091 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:26:46.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:26:46.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:26:46.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:26:46.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:26:46.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:26:46.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:26:46.097 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: d5887493b0075362a9195f326b43ced50f5e16ca48fa69be5b59290d5413cf4d1335916a0246c1a845ddf7dbd7029e309d60bd37b43dd5e54b3b61418d15550eb23bd9eef49e3a36210b68adb2493c820c5117e052ba12c9f1c0d3d89fdf0376b1b8d9b878384bbb1d5ebe998f423992fb5669174b3f650a4d7223350d70542071f993b78a653361c90fc4d3d6b4a7fd4a9850250a6f8a0e4091b393c647374954b7254333cdc7bab947c521ca2ae0b5051236eb343355ebcd148a064fa4582548d5a6cfffe9756b07af0150060274ca503c8728e972a352270d9ac3c942c10728d2dff906f54e7e590514bcc16ab4428ff1cd6f3ff36c32b76501556fd1eefe83f3219290e2545c6884f95097828117f7e53d43c94a2f33e70d28f9d9bee63cf1adf3562f406def2cc98f3cd773d9a88ccce6b915900dc2a723e02a8828baa421f6b202d365e2fea67e967ff3d0a6557c5b021cd776e55ff9de1d96a633ddf5f5071a28f11416d03311d4dce96340c222508aa417cb5da75b1fbced3b83d903 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:68:ec:4d:ea:3e:56:8d:52:1e:39:89:76:a6:f0:af:f0:97:3f:5e] modulus: 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 public exponent: 10001 ] 2022-06-03 12:30:01.959 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:30:01.961 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:30:01.963 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:30:01.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:30:01.965 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 12:30:01.965 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:30:01.965 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:30:01.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:30:01.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:30:01.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:30:01.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:30:01.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:30:01.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:30:01.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:30:02.110 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:30:02.111 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:30:02.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:30:02.112 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:30:02.116 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:30:02.116 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:30:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:30:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:30:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:30:02.118 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:30:02.118 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:30:02.119 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:30:02.120 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:30:02.120 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:30:02.120 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:30:02.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:30:02.127 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:1d:a1:94:76:ff:eb:86:57:9f:f0:a1:5b:fc:3d:58:24:a0:e7:45] modulus: e435fdbe7adb80707857d7942d5277a0968ad2571721c0aa4c6ed47b81502c120fd68b058ebc97ec620509d0bcbf14aff03af6a7e9f9274e5096940627a86d31a1144d28ef2ce2211a568bc670995b2a2a76b92e6f0f9d6e13f4cd6f13382150a16889392082e0efe29ebe66f560a31f1c5a28c0e8089f458889c03e1e3dfd41c86492f000a40199a87dc8af4ff230338bfd8d2191613f739a1a31c7df44fd684bf3aa5a1f6ec256bc1bd285e86e9614989f3d0d72091acc03bff29ade35075e7eb14d53dc7275b1a641b2d5f5468691a801aaa442dacb5157ce90d525b7e6489d49ea06e42b2bbc82766b83bb381f6ff98d6b6c2da41a966758d942955581c3 public exponent: 10001 ] 2022-06-03 12:34:04.543 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:34:04.547 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:34:04.549 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 12:34:04.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:34:04.552 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 12:34:04.552 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:34:04.553 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:34:04.553 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:34:04.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:34:04.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:34:04.561 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:34:04.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:34:04.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:34:04.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:34:04.780 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:34:04.781 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:34:04.781 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:34:04.781 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:34:04.783 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:34:04.783 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:34:04.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:34:04.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:34:04.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:34:04.785 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:34:04.786 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:34:04.786 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:34:04.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:34:04.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:34:04.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:34:04.788 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:34:04.793 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:14:f8:66:52:46:e6:c8:c4:52:b0:77:62:eb:87:eb:17:ff:7d:34] modulus: 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 public exponent: 10001 ] 2022-06-03 12:34:19.671 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-03 12:34:19.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-03 12:34:19.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 12:34:19.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 12:34:19.676 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 12:34:19.677 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-03 12:34:19.677 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-03 12:34:19.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-03 12:34:19.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-03 12:34:19.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-03 12:34:19.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-03 12:34:19.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:34:19.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-03 12:34:19.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:34:19.863 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-03 12:34:19.864 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-03 12:34:19.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-03 12:34:19.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 12:34:19.867 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-03 12:34:19.867 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-03 12:34:19.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:34:19.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:34:19.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:34:19.869 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:34:19.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:34:19.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:34:19.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 12:34:19.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-03 12:34:19.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-03 12:34:19.872 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 12:34:19.875 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336341777404756961702610476308377201630810598369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 08:50:41 UTC 2022 Final Date: Wed Jun 02 08:50:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [47:47:df:96:bf:a5:e0:0f:5a:0d:86:5f:6c:d1:f2:4a:3f:8a:30:c4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 638e3ad801ffc9124859421ce105c3f60984989a 4d4f64eaf1662f92e22ae5857b17dd44b8a87a49 ff9e09d4f168fef383062d5075d7a6a1b11eb410 cd446fcaaa303aaf57bc7e6f87ce68e4a834c656 3ebea60c99d666f0c36bd268a67362a421a005e0 16b961eb8d99e7f7b62f107da1d6547c38ba47be 03ce5b87ed0a4d1ca4aeb54558b76c9a05fe50a2 cd5079f38749ea6214e471bf037051d633eb5447 9e23726f9af2d4952af58d4ef8a9900023df9787 78fc1536979c8c3f4848610e8eb2da4c4531cadb 3fb7dad8a608ccebc17dfbd4cf14c74cc1c16deb 122f9eaa4e9242445b28c6f6c15e0b53f0e9981a 5585ae7a1e0ceb735393537584fd224033263844 0197d8640fb70c128e65cb04f7b37e6ae96e8f07 6efbcee1b52db1fbf07c609beba183e4a17a44b4 442caff3c1ae5009e0560d5b50d265b2969936f7 b4f9a5b4d5da66f767e2646ed7975e900f79a932 e804f338728eb07119ae2a984364567762b14643 d03f84301c5e4944c54972a4d4c0e3a79a7cf139 75055247 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:f6:4f:fe:0d:32:46:ad:9e:0b:e1:21:21:95:fe:8d:28:c4:7c:7f] modulus: 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 public exponent: 10001 ]