By type
2022-06-08 10:44:51,894 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-08 10:44:53,312 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-08 10:44:54.389 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 08, 2022 10:44:57 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 08, 2022 10:44:57 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 08, 2022 10:44:57 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 08, 2022 10:44:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-08 10:44:59.006 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-08 10:44:59.740 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-08 10:45:00.230 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-08 10:45:01.475 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-08 10:45:01.479 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-08 10:45:01.493 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-08 10:45:01.531 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-08 10:45:01.615 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-08 10:45:01.621 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-08 10:45:01.862 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-08 10:45:03.058 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 08, 2022 10:45:04 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-08 10:45:05.253 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 14.923 seconds (JVM running for 18.748) Jun 08, 2022 10:45:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-08 11:45:45.707 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:45:45.754 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:45:45.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:45:45.893 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:45:45.920 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:45:45.926 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:45:45.929 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:45:45.932 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:45:45.933 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:45:45.941 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:45:45.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:45:45.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:45:46.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:45:46.048 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:45:46.049 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:45:46.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:45:47.176 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:45:47.182 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:45:47.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:45:47.186 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:45:47.203 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:45:47.204 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:45:47.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:45:47.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:45:47.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:45:47.237 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:45:47.238 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:45:47.239 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:45:47.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:45:47.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:45:47.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:45:47.259 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:45:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:72:0f:f5:f1:53:23:cc:93:a2:c1:ab:75:f1:57:a2:c6:5d:85:11] modulus: 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 public exponent: 10001 ] 2022-06-08 11:48:37.064 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:48:37.067 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:48:37.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:48:37.070 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:48:37.071 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:48:37.072 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:48:37.072 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:48:37.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:48:37.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:48:37.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:48:37.086 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:48:37.087 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:48:37.089 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:48:37.089 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:48:37.276 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:48:37.277 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:48:37.278 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:48:37.278 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:48:37.296 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:48:37.303 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:48:37.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:48:37.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:48:37.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:48:37.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:48:37.326 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:48:37.326 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:48:37.327 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:48:37.327 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:48:37.328 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:48:37.338 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:48:37.353 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: a854cc5d7890efc99cbfcb36df971149ea7cd294888477123207801f865237c71c7198ab53bb1e191c09b7761042b5ce040299da6e6700cefebe187b5ec62a977a668890180d50a6bfab75aa0a94517a1152a5e84f460314b99e8eedc9f8b84f961786d4b52bce4c9f49d061cd062d858a1408ac9bedb0c7ea0e136b0e5b855a1e717a1cf70654843934d74c06383f43af02891a4d85893700fc342d16c033c6cc4dc3e8a0079e0697011c10dcd25425d0baed22d049c86c698b8386c9d34043ac84db17e453e934e7ae45b82ed4e55146a8332da57edca8ffb3b37b3ca6acad770a57045ba1e86e6f11d68387b90455260786b38ec3af8fc030c8cb197c116ecfba329e28c05ffa59307e3daa81e68fb6fe9a5199c43f0e01337926cee7e6cd88f7e2611538f742ef2c8f5c93eeb51a909312c2d0b4abaf17b6e30e3d09b459e55ea8e7cf9f2b1f39fcb8fe1a24ca6cb35dfa248236b64119a28b40c75f7a1259824f4dfb1a13af0e3c91bc841353359e6c503a352f9297c686be4f9ad00525 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:0d:e1:22:65:c1:ae:f7:af:4c:3f:1f:94:e5:cd:a7:af:48:95:76] modulus: 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 public exponent: 10001 ] 2022-06-08 11:49:55.101 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:49:55.103 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:49:55.105 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-08 11:49:55.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:49:55.107 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-08 11:49:55.108 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:49:55.109 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:49:55.109 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:49:55.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:49:55.112 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:49:55.119 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:49:55.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:49:55.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:49:55.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:49:55.263 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:49:55.264 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:49:55.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:49:55.266 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:49:55.268 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:49:55.268 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:49:55.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:49:55.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:49:55.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:49:55.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:49:55.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:49:55.273 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:49:55.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:49:55.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:49:55.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:49:55.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:49:55.283 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:12:74:c6:76:f3:7d:f7:5e:85:3d:98:5c:cd:49:2d:e1:de:47:fd] modulus: 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 public exponent: 10001 ] 2022-06-08 11:51:17.795 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:51:17.797 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:51:17.799 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-08 11:51:17.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:51:17.801 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-08 11:51:17.803 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:51:17.804 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:51:17.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:51:17.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:51:17.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:51:17.814 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:51:17.816 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:51:17.816 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:51:17.817 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:51:18.010 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:51:18.011 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:51:18.011 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:51:18.012 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:51:18.014 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:51:18.015 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:51:18.016 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:51:18.017 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:51:18.017 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:51:18.019 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:51:18.020 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:51:18.021 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:51:18.023 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:51:18.024 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:51:18.038 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:51:18.040 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:51:18.048 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:2f:43:9c:d2:a7:a2:18:ff:51:ab:60:a7:38:03:b7:40:fb:3c:7b] modulus: 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 public exponent: 10001 ] 2022-06-08 11:53:52.518 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:53:52.527 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:53:52.536 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:53:52.554 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:53:52.555 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:53:52.557 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:53:52.559 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:53:52.560 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:53:52.560 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:53:52.565 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:53:52.572 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:53:52.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:53:52.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:53:52.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:53:52.766 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:53:52.766 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:53:52.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:53:52.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:53:52.769 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:53:52.769 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:53:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:53:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:53:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:53:52.771 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:53:52.771 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:53:52.772 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:53:52.773 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:53:52.773 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:53:52.773 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:53:52.774 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:53:52.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:cf:98:7e:ac:a7:10:9d:b4:ea:59:15:2b:32:b6:0e:6a:4c:d2:80] modulus: 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 public exponent: 10001 ] 2022-06-08 11:58:12.699 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:58:12.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:58:12.705 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:58:12.707 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:58:12.708 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 11:58:12.709 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:58:12.709 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:58:12.710 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:58:12.711 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:58:12.712 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:58:12.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:58:12.724 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:58:12.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:58:12.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:58:12.913 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:58:12.914 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:58:12.915 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:58:12.917 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:58:12.919 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:58:12.920 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:58:12.921 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:58:12.921 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:58:12.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:58:12.923 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:58:12.924 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:58:12.924 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:58:12.925 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:58:12.926 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:58:12.926 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:58:12.928 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:58:12.933 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:2e:27:c6:73:15:3c:f9:ce:33:72:0f:e7:4c:c0:d5:a1:a1:ad:c6] modulus: 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 public exponent: 10001 ] 2022-06-08 11:59:05.791 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 11:59:05.793 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 11:59:05.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-08 11:59:05.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 11:59:05.796 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-08 11:59:05.797 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 11:59:05.798 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 11:59:05.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 11:59:05.799 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 11:59:05.799 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 11:59:05.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 11:59:05.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:59:05.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 11:59:05.806 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:59:05.973 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 11:59:05.974 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 11:59:05.976 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 11:59:05.976 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 11:59:05.980 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 11:59:05.982 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 11:59:05.983 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:59:05.983 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:59:05.983 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:59:05.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:59:05.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:59:05.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:59:05.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 11:59:05.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 11:59:05.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 11:59:05.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 11:59:05.994 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:60:53:45:a8:1a:72:bf:3e:e4:3e:0c:d4:aa:78:67:dc:2f:83:4c] modulus: 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 public exponent: 10001 ] 2022-06-08 12:02:05.901 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:02:05.907 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:02:05.910 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:02:05.912 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:02:05.912 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:02:05.913 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:02:05.914 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:02:05.914 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:02:05.915 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:02:05.916 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:02:05.923 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:02:05.925 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:02:05.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:02:05.927 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:02:06.133 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:02:06.142 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:02:06.143 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:02:06.143 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:02:06.150 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:02:06.151 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:02:06.152 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:02:06.152 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:02:06.153 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:02:06.154 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:02:06.154 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:02:06.155 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:02:06.156 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:02:06.156 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:02:06.157 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:02:06.158 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:02:06.164 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: a854cc5d7890efc99cbfcb36df971149ea7cd294888477123207801f865237c71c7198ab53bb1e191c09b7761042b5ce040299da6e6700cefebe187b5ec62a977a668890180d50a6bfab75aa0a94517a1152a5e84f460314b99e8eedc9f8b84f961786d4b52bce4c9f49d061cd062d858a1408ac9bedb0c7ea0e136b0e5b855a1e717a1cf70654843934d74c06383f43af02891a4d85893700fc342d16c033c6cc4dc3e8a0079e0697011c10dcd25425d0baed22d049c86c698b8386c9d34043ac84db17e453e934e7ae45b82ed4e55146a8332da57edca8ffb3b37b3ca6acad770a57045ba1e86e6f11d68387b90455260786b38ec3af8fc030c8cb197c116ecfba329e28c05ffa59307e3daa81e68fb6fe9a5199c43f0e01337926cee7e6cd88f7e2611538f742ef2c8f5c93eeb51a909312c2d0b4abaf17b6e30e3d09b459e55ea8e7cf9f2b1f39fcb8fe1a24ca6cb35dfa248236b64119a28b40c75f7a1259824f4dfb1a13af0e3c91bc841353359e6c503a352f9297c686be4f9ad00525 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:61:b9:fd:42:6d:25:08:46:a0:40:cf:07:36:58:6b:27:0f:b7:bb] modulus: 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 public exponent: 10001 ] 2022-06-08 12:04:04.296 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:04:04.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:04:04.300 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-08 12:04:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:04:04.302 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-08 12:04:04.302 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:04:04.303 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:04:04.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:04:04.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:04:04.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:04:04.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:04:04.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:04:04.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:04:04.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:04:04.497 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:04:04.498 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:04:04.499 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:04:04.499 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:04:04.501 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:04:04.502 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:04:04.502 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:04:04.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:04:04.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:04:04.504 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:04:04.504 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:04:04.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:04:04.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:04:04.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:04:04.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:04:04.508 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:04:04.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:28:e7:4f:38:06:33:e2:70:c6:e2:3e:8a:39:c2:61:9f:05:a5:f9] modulus: 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 public exponent: 10001 ] 2022-06-08 12:04:21.708 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:04:21.710 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:04:21.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-08 12:04:21.713 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:04:21.713 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-08 12:04:21.714 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:04:21.715 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:04:21.715 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:04:21.716 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:04:21.716 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:04:21.723 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:04:21.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:04:21.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:04:21.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:04:21.854 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:04:21.855 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:04:21.855 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:04:21.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:04:21.860 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:04:21.861 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:04:21.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:04:21.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:04:21.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:04:21.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:04:21.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:04:21.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:04:21.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:04:21.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:04:21.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:04:21.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:04:21.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:fd:c0:bd:61:78:11:68:2f:f6:36:5d:1e:bb:99:b5:e6:07:d4:22] modulus: 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 public exponent: 10001 ] 2022-06-08 12:06:56.154 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:06:56.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:06:56.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:06:56.159 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:06:56.159 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:06:56.160 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:06:56.161 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:06:56.161 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:06:56.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:06:56.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:06:56.169 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:06:56.169 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:06:56.170 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:06:56.170 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:06:56.342 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:06:56.343 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:06:56.343 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:06:56.344 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:06:56.347 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:06:56.348 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:06:56.348 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:06:56.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:06:56.351 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:06:56.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:06:56.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:06:56.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:06:56.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:06:56.355 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:06:56.355 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:06:56.356 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:06:56.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:d5:88:a4:be:c4:66:71:07:87:a8:a5:82:90:cb:f9:b7:d6:d9:3c] modulus: 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 public exponent: 10001 ] 2022-06-08 12:11:07.460 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:11:07.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:11:07.467 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:11:07.468 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:11:07.469 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:11:07.469 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:11:07.470 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:11:07.470 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:11:07.471 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:11:07.472 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:11:07.480 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:11:07.481 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:11:07.482 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:11:07.482 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:11:07.655 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:11:07.657 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:11:07.666 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:11:07.666 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:11:07.668 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:11:07.668 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:11:07.668 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:11:07.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:11:07.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:11:07.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:11:07.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:11:07.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:11:07.671 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:11:07.671 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:11:07.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:11:07.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:11:07.676 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:76:d7:00:00:ce:4f:1c:a3:f9:e2:10:fa:9d:17:a0:c4:db:d7:e6] modulus: e0428e8e7ccee8b3a69685273381bdbecb61bbcda033ccf057821713fe3e426cd16a8349bed5ad16b9ecacec8f5a82cbe927b8563ad5fbf6300d77470ee0c24f2ff215964cefbff481d4f4d418478e870eac8eab97ecbce4cd8164c88b851b6468ba584ea27efad26ab6ceed0679771a3e769dc6d1c8035473c3772ac4cef5eaa83c8ea1d81e415ddabe006228c071bbf1809be22407aae4e85b02c10cc58f861944c1778de28f2916ff70ab0f5fcc03f4bdb5e87b676165d9f531bf65c76610da33b32d998d176497de042e966b9f8e8a8858239149fd573637137216770e389885ada87f6cb45e8fafe7ecaea5ae5fa7ea67d80a83b44f42f670663d0a6271 public exponent: 10001 ] 2022-06-08 12:15:11.508 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:15:11.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:15:11.512 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:15:11.513 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:15:11.513 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:15:11.514 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:15:11.514 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:15:11.514 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:15:11.515 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:15:11.517 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:15:11.522 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:15:11.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:15:11.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:15:11.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:15:11.754 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:15:11.755 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:15:11.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:15:11.756 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:15:11.757 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:15:11.758 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:15:11.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:15:11.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:15:11.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:15:11.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:15:11.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:15:11.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:15:11.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:15:11.761 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:15:11.761 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:15:11.761 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:15:11.764 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:54:19:8c:ce:c9:74:fa:58:42:e6:20:b2:81:96:28:09:39:5f:fc] modulus: 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 public exponent: 10001 ] 2022-06-08 12:21:22.733 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:21:22.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:21:22.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:21:22.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:21:22.741 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:21:22.742 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:21:22.742 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:21:22.743 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:21:22.743 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:21:22.744 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:21:22.751 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:21:22.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:21:22.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:21:22.753 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:21:22.947 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:21:22.948 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:21:22.948 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:21:22.949 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:21:22.951 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:21:22.951 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:21:22.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:21:22.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:21:22.953 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:21:22.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:21:22.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:21:22.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:21:22.955 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:21:22.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:21:22.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:21:22.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:21:22.962 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:a6:cf:a0:4d:b6:1e:7a:a8:24:87:64:b9:b6:29:6a:8f:60:b4:1f] modulus: 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 public exponent: 10001 ] 2022-06-08 12:25:43.743 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 12:25:43.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 12:25:43.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:25:43.750 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 12:25:43.750 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 12:25:43.751 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 12:25:43.751 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 12:25:43.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 12:25:43.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 12:25:43.753 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 12:25:43.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 12:25:43.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:25:43.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 12:25:43.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:25:43.910 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 12:25:43.912 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 12:25:43.912 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 12:25:43.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 12:25:43.915 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 12:25:43.915 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 12:25:43.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:25:43.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:25:43.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:25:43.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:25:43.918 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:25:43.918 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:25:43.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 12:25:43.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 12:25:43.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 12:25:43.920 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 12:25:43.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 579291430972657681536592305820940214378245345940 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 10:12:41 UTC 2022 Final Date: Mon Jun 07 10:12:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [af:4b:43:ef:3f:1a:22:4f:10:b2:4b:5b:ba:6b:b0:16:aa:36:06:2e] modulus: a854cc5d7890efc99cbfcb36df971149ea7cd294888477123207801f865237c71c7198ab53bb1e191c09b7761042b5ce040299da6e6700cefebe187b5ec62a977a668890180d50a6bfab75aa0a94517a1152a5e84f460314b99e8eedc9f8b84f961786d4b52bce4c9f49d061cd062d858a1408ac9bedb0c7ea0e136b0e5b855a1e717a1cf70654843934d74c06383f43af02891a4d85893700fc342d16c033c6cc4dc3e8a0079e0697011c10dcd25425d0baed22d049c86c698b8386c9d34043ac84db17e453e934e7ae45b82ed4e55146a8332da57edca8ffb3b37b3ca6acad770a57045ba1e86e6f11d68387b90455260786b38ec3af8fc030c8cb197c116ecfba329e28c05ffa59307e3daa81e68fb6fe9a5199c43f0e01337926cee7e6cd88f7e2611538f742ef2c8f5c93eeb51a909312c2d0b4abaf17b6e30e3d09b459e55ea8e7cf9f2b1f39fcb8fe1a24ca6cb35dfa248236b64119a28b40c75f7a1259824f4dfb1a13af0e3c91bc841353359e6c503a352f9297c686be4f9ad00525 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 41f201d646d859a8f2411ded4b67dabfeac91dcd bd0048f8f7470363c9726491cbb30fe09998c6d0 baf7e4fef93666380b1154f6a4e5cacd021232cb afd4d50a11521a8285d62a0468e7b6e0041d885a 1528886bc7670cb9a26bb6733f60b498c302a7c1 32408e4716884135d512197fde0cd8b7ca3a5962 5daf49847f7a5c972fb2c9b25d74939c8a6a29cb 893197ee1c69eef9ac8b4a309ee356019416d54c 5333afd5dd655ca4845d679cfc567787719c938c 0eabff01207b2ffbc41c769298821cc3ec1b2c58 9e86324225754308f2db484bbb21ea5a3ecb639c 25dd17841fe6c7b7dc5a4956cae3445ca2d6df6b 9cf509c0c57d551433ae1c018fe084b0729fa3a3 0abb8767962baec1a8768a0e3b6a8e861f3a3cbb 18308b536d2bdd1351b2f1c608109de0db28b875 1c5deed123f2ae5dc76185837f88be5a11ff8697 f6c1eba2753f436a58ed41106895d840b93da872 cbaaef035b884d7d99ed3e2ff146e3d7663c7320 acd749d94fa31abd939359ef26b5a072ab649a8d 3097bf6d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:12:02:d7:36:3b:82:e7:d3:4d:f4:8f:78:9e:5a:4a:96:83:63:e6] modulus: bd0ae06d14866c9b7a1353e51caaa6e3ba133ba7438e207373d8bbdfa8cbab6cdaf44fcb8f249194a04eb92cb52ec573946658978c7075e3e9bab683569f44ea07c66974ad8c1afc8e3bb6d590e3fb8c2eff7ef50eaf25b9bec79e5df9b8a09be5b6ec2d4f4a350e9d7558359c17310f0ba84a390c729147f93e0a6604861114d09168d4b2ca959bb63f8ee70e33083ab284bde49342837148017ca16fd0fb5a053329cd710cb0a56086456d4db08e7452383e023797cf0c56d0fdbf55a0262d5b00f84899662ada604ff3b81512b9b27d8bf5f2012e3ad2e48526f01ac2747d70c5acaea646a0cda2b58afaa0a531e4bea13374e187ca4eaaa112350527c58b public exponent: 10001 ]