By type
2022-03-31 05:25:31,491 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-31 05:25:33,141 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-31 05:25:34.797 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 31, 2022 5:25:39 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 31, 2022 5:25:39 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 31, 2022 5:25:39 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 31, 2022 5:25:40 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-31 05:25:41.310 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-31 05:25:41.873 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-31 05:25:42.337 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-31 05:25:43.430 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-31 05:25:43.434 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-31 05:25:43.436 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-31 05:25:43.440 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-31 05:25:43.513 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-31 05:25:43.517 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-31 05:25:43.663 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-31 05:25:45.201 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 31, 2022 5:25:46 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-31 05:25:46.867 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 16.713 seconds (JVM running for 19.849) Mar 31, 2022 5:26:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-31 07:20:58.314 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:20:58.343 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:20:58.415 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-31 07:20:58.425 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:20:58.466 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-31 07:20:58.471 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:20:58.474 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:20:58.478 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:20:58.478 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:20:58.486 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:20:58.501 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:20:58.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:20:58.565 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:20:58.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:20:58.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:20:58.583 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:20:59.427 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:20:59.431 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:20:59.433 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:20:59.437 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:20:59.459 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:20:59.461 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:20:59.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:20:59.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:20:59.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:20:59.489 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:20:59.490 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:20:59.491 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:20:59.502 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:20:59.504 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:20:59.504 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:20:59.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:20:59.550 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:c7:75:fd:f2:7e:4d:fe:38:15:79:0a:1a:9a:8d:39:b6:1a:16:25] modulus: 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 public exponent: 10001 ] 2022-03-31 07:21:25.523 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:21:25.525 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:21:25.527 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:21:25.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:21:25.529 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:21:25.531 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:21:25.532 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:21:25.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:21:25.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:21:25.535 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:21:25.547 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:21:25.548 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:21:25.549 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:21:25.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:21:25.699 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:21:25.702 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:21:25.705 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:21:25.706 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:21:25.716 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:21:25.717 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:21:25.719 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:21:25.720 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:21:25.721 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:21:25.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:21:25.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:21:25.731 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:21:25.737 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:21:25.739 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:21:25.740 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:21:25.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:21:25.760 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:5f:d6:3b:5b:d9:9b:7d:d7:2f:dd:0a:cb:ce:4a:ec:9d:15:b2:b5] modulus: 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 public exponent: 10001 ] 2022-03-31 07:23:27.350 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:23:27.353 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:23:27.356 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-31 07:23:27.357 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:23:27.358 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-31 07:23:27.359 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:23:27.360 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:23:27.361 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:23:27.361 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:23:27.362 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:23:27.371 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:23:27.373 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:23:27.374 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:23:27.375 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:23:27.522 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:23:27.523 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:23:27.524 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:23:27.525 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:23:27.528 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:23:27.528 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:23:27.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:23:27.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:23:27.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:23:27.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:23:27.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:23:27.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:23:27.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:23:27.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:23:27.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:23:27.534 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:23:27.544 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:c9:4b:9f:9e:e3:39:6e:08:6e:69:74:89:b5:00:5d:46:17:e1:f7] modulus: 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 public exponent: 10001 ] 2022-03-31 07:24:35.279 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:24:35.281 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:24:35.283 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-03-31 07:24:35.284 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:24:35.285 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-03-31 07:24:35.286 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:24:35.286 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:24:35.287 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:24:35.288 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:24:35.289 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:24:35.295 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:24:35.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:24:35.297 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:24:35.297 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:24:35.523 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:24:35.524 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:24:35.525 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:24:35.526 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:24:35.530 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:24:35.531 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:24:35.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:24:35.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:24:35.533 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:24:35.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:24:35.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:24:35.536 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:24:35.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:24:35.538 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:24:35.538 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:24:35.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:24:35.545 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:7f:83:1e:92:80:f8:1c:f7:81:d0:8b:05:a4:7f:45:94:f0:c7:5d] modulus: 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 public exponent: 10001 ] 2022-03-31 07:26:27.777 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:26:27.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:26:27.782 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:26:27.783 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:26:27.784 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:26:27.786 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:26:27.787 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:26:27.787 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:26:27.788 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:26:27.788 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:26:27.795 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:26:27.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:26:27.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:26:27.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:26:27.974 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:26:27.976 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:26:27.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:26:27.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:26:27.979 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:26:27.980 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:26:27.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:26:27.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:26:27.982 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:26:27.985 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:26:27.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:26:27.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:26:27.988 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:26:27.988 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:26:27.989 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:26:27.990 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:26:27.997 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:96:ce:63:11:78:71:23:66:ea:e4:08:36:0a:06:74:36:73:a4:8e] modulus: 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 public exponent: 10001 ] 2022-03-31 07:27:47.485 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:27:47.487 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:27:47.490 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 07:27:47.491 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:27:47.491 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 07:27:47.492 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:27:47.492 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:27:47.493 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:27:47.493 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:27:47.494 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:27:47.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:27:47.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:27:47.503 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:27:47.503 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:27:47.681 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:27:47.682 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:27:47.683 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:27:47.683 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:27:47.685 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:27:47.686 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:27:47.686 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:27:47.687 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:27:47.687 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:27:47.688 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:27:47.688 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:27:47.689 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:27:47.689 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:27:47.690 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:27:47.690 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:27:47.691 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:27:47.696 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:01:67:a9:9a:00:67:a8:3c:42:32:6e:69:49:8d:d4:48:31:78:15] modulus: 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 public exponent: 10001 ] 2022-03-31 07:28:08.783 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:28:08.785 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:28:08.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 07:28:08.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:28:08.788 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 07:28:08.788 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:28:08.789 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:28:08.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:28:08.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:28:08.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:28:08.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:28:08.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:28:08.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:28:08.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:28:08.901 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:28:08.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:28:08.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:28:08.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:28:08.907 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:28:08.907 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:28:08.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:28:08.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:28:08.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:28:08.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:28:08.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:28:08.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:28:08.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:28:08.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:28:08.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:28:08.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:28:08.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:d5:e5:9f:e7:6e:10:0c:67:c4:bc:60:6c:54:fa:4d:1b:a3:f1:48] modulus: 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 public exponent: 10001 ] 2022-03-31 07:28:47.608 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:28:47.610 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:28:47.613 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:28:47.615 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:28:47.616 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:28:47.616 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:28:47.617 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:28:47.617 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:28:47.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:28:47.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:28:47.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:28:47.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:28:47.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:28:47.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:28:47.782 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:28:47.783 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:28:47.784 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:28:47.784 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:28:47.786 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:28:47.787 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:28:47.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:28:47.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:28:47.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:28:47.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:28:47.790 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:28:47.790 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:28:47.791 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:28:47.791 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:28:47.792 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:28:47.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:28:47.798 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:9e:97:e6:93:f7:f8:d3:8e:77:52:34:1f:27:b2:a1:66:f0:5d:ab] modulus: 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 public exponent: 10001 ] 2022-03-31 07:32:05.956 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:32:05.957 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:32:05.959 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:32:05.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:32:05.960 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:32:05.961 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:32:05.961 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:32:05.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:32:05.962 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:32:05.962 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:32:05.967 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:32:05.968 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:32:05.968 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:32:05.968 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:32:06.086 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:32:06.086 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:32:06.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:32:06.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:32:06.089 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:32:06.089 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:32:06.089 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:32:06.090 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:32:06.090 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:32:06.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:32:06.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:32:06.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:32:06.092 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:32:06.092 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:32:06.092 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:32:06.093 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:32:06.097 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:bd:e7:3c:32:0a:ee:40:6b:34:ae:12:df:4f:d1:dc:c3:0c:80:e5] modulus: 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 public exponent: 10001 ] 2022-03-31 07:35:36.958 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:35:36.961 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:35:36.964 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:35:36.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:35:36.966 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:35:36.967 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:35:36.967 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:35:36.968 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:35:36.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:35:36.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:35:36.978 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:35:36.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:35:36.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:35:36.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:35:37.155 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:35:37.156 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:35:37.156 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:35:37.157 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:35:37.159 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:35:37.159 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:35:37.160 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:35:37.161 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:35:37.161 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:35:37.162 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:35:37.163 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:35:37.163 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:35:37.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:35:37.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:35:37.165 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:35:37.166 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:35:37.171 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:f6:80:67:d2:11:4e:80:1c:23:23:04:5d:e0:30:08:81:7e:d3:b5] modulus: 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 public exponent: 10001 ] 2022-03-31 07:37:58.315 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:37:58.318 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:37:58.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:37:58.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:37:58.322 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:37:58.323 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:37:58.324 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:37:58.324 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:37:58.325 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:37:58.325 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:37:58.336 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:37:58.338 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:37:58.338 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:37:58.339 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:37:58.422 [31mERROR[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-03-31 07:37:58.448 [31mERROR[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-03-31 07:40:57.037 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:40:57.040 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:40:57.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:40:57.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:40:57.044 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:40:57.045 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:40:57.046 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:40:57.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:40:57.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:40:57.048 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:40:57.056 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:40:57.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:40:57.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:40:57.059 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:40:57.192 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:40:57.193 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:40:57.195 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:40:57.195 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:40:57.197 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:40:57.197 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:40:57.198 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:40:57.199 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:40:57.199 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:40:57.201 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:40:57.201 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:40:57.202 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:40:57.203 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:40:57.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:40:57.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:40:57.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:40:57.213 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:13:ad:48:65:f5:e8:7d:8d:ba:b9:09:53:cd:4f:40:c2:c5:87:d8] modulus: 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 public exponent: 10001 ] 2022-03-31 07:44:30.751 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:44:30.753 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:44:30.755 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:44:30.756 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:44:30.756 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:44:30.757 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:44:30.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:44:30.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:44:30.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:44:30.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:44:30.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:44:30.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:44:30.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:44:30.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:44:30.906 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:44:30.907 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:44:30.907 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:44:30.908 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:44:30.910 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:44:30.911 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:44:30.911 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:44:30.912 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:44:30.912 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:44:30.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:44:30.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:44:30.914 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:44:30.915 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:44:30.915 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:44:30.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:44:30.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:44:30.923 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: b4059f95e04e93ca78de45e74e2e7f0c0670694035d69b853ea94c120a1510483ce456da5c0c1b8c472f8ab34edbc451a6e4b004aca3e6090913158b0fb938e4412d5cb571784eb2757fc9d9ddc373ff2b70c8fa7503214284c861e51516321a3f1f3109ead9cdb623917d17bde2f4496c33dec4e07e2d549ce43a7ddb45d6aac54aa5a3e1261b19e6fae4da048d3471358a1c0cfc6bedfedd6155382d28a473a2d72adc1180ee5efa86854e52e5a89c1839d3ec8ac7898a97f7fc998f93a8f8ab563cf183e3a05dc4f270351a668351d2aaad49ff20ca8e5aa7e85e67052ff5377ade246f9eb998bee1f6a6ccbeb67c5328b5aac0472abd2013027b946bf9c63285b147c96fd27e7447799a9e80d878eecc968a8ac466913fe708e95277fc8bc9078fea9a09baa2b0e6e006d14bebca6fd191d3780b08b2337b1303f5f4942b9b4ec6b7321533a6d18bdd9b16f7bdad86c5f24169c518c5531b9d16e8a4d6096e9e000f1b6cf8231daab661ebf563d106c118bff0ccc55eeb72dd5190c37205 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:66:ea:6a:af:4d:72:21:f0:8d:23:09:9b:c0:c1:bc:21:65:56:65] modulus: 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 public exponent: 10001 ] 2022-03-31 07:47:40.546 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:47:40.548 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:47:40.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:47:40.552 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:47:40.553 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:47:40.553 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:47:40.554 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:47:40.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:47:40.555 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:47:40.555 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:47:40.561 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:47:40.562 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:47:40.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:47:40.564 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:47:40.685 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:47:40.686 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:47:40.687 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:47:40.687 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:47:40.689 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:47:40.690 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:47:40.690 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:47:40.691 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:47:40.691 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:47:40.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:47:40.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:47:40.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:47:40.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:47:40.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:47:40.695 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:47:40.696 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:47:40.700 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: b4059f95e04e93ca78de45e74e2e7f0c0670694035d69b853ea94c120a1510483ce456da5c0c1b8c472f8ab34edbc451a6e4b004aca3e6090913158b0fb938e4412d5cb571784eb2757fc9d9ddc373ff2b70c8fa7503214284c861e51516321a3f1f3109ead9cdb623917d17bde2f4496c33dec4e07e2d549ce43a7ddb45d6aac54aa5a3e1261b19e6fae4da048d3471358a1c0cfc6bedfedd6155382d28a473a2d72adc1180ee5efa86854e52e5a89c1839d3ec8ac7898a97f7fc998f93a8f8ab563cf183e3a05dc4f270351a668351d2aaad49ff20ca8e5aa7e85e67052ff5377ade246f9eb998bee1f6a6ccbeb67c5328b5aac0472abd2013027b946bf9c63285b147c96fd27e7447799a9e80d878eecc968a8ac466913fe708e95277fc8bc9078fea9a09baa2b0e6e006d14bebca6fd191d3780b08b2337b1303f5f4942b9b4ec6b7321533a6d18bdd9b16f7bdad86c5f24169c518c5531b9d16e8a4d6096e9e000f1b6cf8231daab661ebf563d106c118bff0ccc55eeb72dd5190c37205 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:57:b4:79:89:cc:30:03:29:24:ec:9b:b1:04:c0:42:2c:35:11:79] modulus: e8784ba3b5d13d093a55162839f8e7a47a2f57a6e516c06b4e19e878a062edbf5d68e1499f922cfa6e31836f100812de609d162e5f321c6e0989e8d883a13e37260e9a4f5e9d74ae9810b856d34ed994cf5cbee5a9c04601aa00f4858e2303672e08470f4ca0c216aa7e5452a39818d350b36f319024835990a1fe82b078733eff8ad3c8e33ff67a8c4f10488e9eee1796eabd8bc2b203c781e42f944faba927b197d4aafc96bdf1c4f014f64086734d3a252a32352d3c962694720e7e3f99a1e70ba18d03f8e8ecc71afe9a91b966545cfde7f9d71ee85f5c76f852699db4c29fe140c3feb39c12d391d0653b0fb2024d72b97a391212919184333dbd33422b public exponent: 10001 ] 2022-03-31 07:48:41.219 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:48:41.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:48:41.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 07:48:41.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:48:41.223 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 07:48:41.224 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:48:41.224 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:48:41.224 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:48:41.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:48:41.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:48:41.232 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:48:41.233 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:48:41.234 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:48:41.234 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:48:41.367 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:48:41.369 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:48:41.369 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:48:41.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:48:41.372 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:48:41.373 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:48:41.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:48:41.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:48:41.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:48:41.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:48:41.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:48:41.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:48:41.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:48:41.379 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:48:41.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:48:41.382 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:48:41.386 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:91:d1:7c:aa:eb:0b:e4:7f:a2:6c:3a:e1:28:a3:61:f2:11:91:97] modulus: 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 public exponent: 10001 ] 2022-03-31 07:48:56.724 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:48:56.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:48:56.727 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 07:48:56.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:48:56.728 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 07:48:56.729 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:48:56.730 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:48:56.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:48:56.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:48:56.731 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:48:56.740 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:48:56.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:48:56.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:48:56.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:48:56.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:48:56.854 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:48:56.854 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:48:56.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:48:56.857 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:48:56.857 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:48:56.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:48:56.859 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:48:56.859 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:48:56.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:48:56.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:48:56.861 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:48:56.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:48:56.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:48:56.863 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:48:56.864 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:48:56.869 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:ad:f6:0a:25:ed:fd:8f:f2:47:cf:50:0b:44:c0:75:d3:99:c7:83] modulus: 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 public exponent: 10001 ] 2022-03-31 07:51:28.844 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 07:51:28.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 07:51:28.847 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:51:28.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 07:51:28.849 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 07:51:28.850 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 07:51:28.850 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 07:51:28.851 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 07:51:28.851 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 07:51:28.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 07:51:28.860 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 07:51:28.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:51:28.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 07:51:28.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:51:28.970 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 07:51:28.971 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 07:51:28.971 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 07:51:28.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 07:51:28.973 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 07:51:28.973 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 07:51:28.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:51:28.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:51:28.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:51:28.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:51:28.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:51:28.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:51:28.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 07:51:28.977 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 07:51:28.977 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 07:51:28.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 07:51:28.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:59:1e:6b:4d:f5:80:90:b8:68:f3:91:44:88:b0:5c:8c:48:da:cc] modulus: c0547439b832774dc59623374e018141c83e255ac05565dccdfd6b18c38b3c91228c826ffb68945650b5478ce3d957a2c19a46fb053c73536a4b95a4fb67bcd96053816ccadc78d06e5668fe67799cd8ad8bea75d675544e702923ac8a1728cd1046e1b2ce1e32934373d908ae82ec1dd74fe673b085da3195b59341df14107d3c6e1bb68f9c30d1fb20a84ac004e68142db0aa7056c08d8718616a0c32ca098e77386fb4be10c2a3788e483e4d3fa9a883fe3f45b032a929732cfc5b4b23695fffd1a27d77424a3a982650395a105bc5dbba7567af180fc436a0026bde128926adf0831c8df45e8b4d21fb07defbac1dd3ddd6196a3389399e439bb47c3bc71 public exponent: 10001 ] 2022-03-31 08:14:55.395 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 08:14:55.399 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 08:14:55.407 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 08:14:55.408 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 08:14:55.409 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 08:14:55.411 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 08:14:55.412 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 08:14:55.412 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 08:14:55.414 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 08:14:55.415 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 08:14:55.425 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 08:14:55.426 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 08:14:55.427 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 08:14:55.427 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 08:14:55.588 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 08:14:55.589 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 08:14:55.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 08:14:55.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 08:14:55.591 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 08:14:55.591 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 08:14:55.592 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 08:14:55.592 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 08:14:55.592 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 08:14:55.593 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 08:14:55.593 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 08:14:55.593 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 08:14:55.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 08:14:55.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 08:14:55.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 08:14:55.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 08:14:55.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:8d:71:ff:9e:99:72:b6:0a:64:13:68:2a:50:51:e2:44:25:2c:9c] modulus: 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 public exponent: 10001 ] 2022-03-31 08:15:02.966 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 08:15:02.967 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 08:15:02.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 08:15:02.970 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 08:15:02.970 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 08:15:02.971 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 08:15:02.971 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 08:15:02.972 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 08:15:02.972 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 08:15:02.972 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 08:15:02.978 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 08:15:02.979 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 08:15:02.979 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 08:15:02.980 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 08:15:03.080 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 08:15:03.081 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 08:15:03.082 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 08:15:03.082 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 08:15:03.083 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 08:15:03.084 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 08:15:03.084 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 08:15:03.084 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 08:15:03.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 08:15:03.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 08:15:03.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 08:15:03.086 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 08:15:03.086 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 08:15:03.087 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 08:15:03.087 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 08:15:03.087 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 08:15:03.091 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301128614032609291462494067203259609595635396263 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 04:57:40 UTC 2022 Final Date: Tue Mar 30 04:57:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0c:ea:46:83:fc:4f:da:11:d9:f9:5c:a1:c8:64:65:d3:e1:11:df:cd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1328a00549e0c35df9d30388a2ce1da2c8c7852c 973b0349dab44bbab5a6407cef65cd8a09278583 76f6252fb18999812a978795be168c86846621c0 9b3bb577f8ed143394ed1b3b30be7822bfaaa1f7 f0f1ca5689e722d93888b26b6240c76aea2af823 6b31b34d491b67bf9c21a0b0051d743847a1eb16 2e9af70c8a7df2888956270538b8ba15345269b4 3f700f8067741377efd0680bdf70b1dda882b305 51326770aaf60936d2ff7ac922db35186b59b5b9 c1a84522ea74adea352df5d23dfe646beab68ac1 98b269aaa09f4210e3fc037fbce370bd0b60a22b 30eb50a5517bdac12ca616c348afcfbe3b1f8f60 09ae45196248295152ae88499846ff6e7caa0c03 f183c6dce11dc89dc63d4b4999ba2a574f9f4ed2 1f5963d726332805002dc442e6e526eba5ed649d 5438d01741648ffe6d6bbad80812e210085e1050 595983bad08ac567395adeb74d2d5169b90666cd 00be8760c3af704815c777cc97b092309632c749 5e71ca13f27482fccd68efa59e73473a6008725e 7084654d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:64:9c:2b:64:8e:98:2c:3d:15:02:fd:40:25:80:ad:a4:0b:c3:eb] modulus: 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 public exponent: 10001 ]