By type
2022-03-31 12:47:57,720 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-31 12:47:58,474 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-31 12:47:59.266 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 31, 2022 12:48:01 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 31, 2022 12:48:01 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 31, 2022 12:48:01 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 31, 2022 12:48:01 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-31 12:48:02.121 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-31 12:48:02.405 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-31 12:48:02.597 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-31 12:48:03.324 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-31 12:48:03.327 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-31 12:48:03.328 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-31 12:48:03.333 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-31 12:48:03.372 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-31 12:48:03.376 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-31 12:48:03.501 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-31 12:48:04.043 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 31, 2022 12:48:04 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-31 12:48:04.934 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.962 seconds (JVM running for 9.766) Mar 31, 2022 12:48:35 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-31 12:49:00.300 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 12:49:00.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 12:49:00.354 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-31 12:49:00.358 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 12:49:00.374 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-31 12:49:00.377 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 12:49:00.378 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 12:49:00.380 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 12:49:00.380 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 12:49:00.384 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 12:49:00.390 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 12:49:00.393 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 12:49:00.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 12:49:00.438 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 12:49:00.438 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 12:49:00.442 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 12:49:01.384 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 12:49:01.388 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 12:49:01.389 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 12:49:01.391 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 12:49:01.404 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 12:49:01.405 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 12:49:01.407 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 12:49:01.407 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 12:49:01.408 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 12:49:01.419 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 12:49:01.420 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 12:49:01.420 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 12:49:01.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 12:49:01.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 12:49:01.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 12:49:01.429 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 12:49:01.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:93:ff:dc:9d:c4:fe:e6:51:13:e7:62:fe:f7:f1:1a:9d:6a:47:4f] modulus: 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 public exponent: 10001 ] 2022-03-31 14:03:30.080 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:03:30.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:03:30.087 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-31 14:03:30.088 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:03:30.089 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-31 14:03:30.090 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:03:30.091 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:03:30.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:03:30.093 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:03:30.095 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:03:30.103 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:03:30.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:03:30.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:03:30.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:03:30.364 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:03:30.366 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:03:30.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:03:30.367 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:03:30.372 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:03:30.373 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:03:30.374 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:03:30.374 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:03:30.385 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:03:30.386 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:03:30.387 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:03:30.387 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:03:30.388 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:03:30.389 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:03:30.389 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:03:30.390 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:03:30.396 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:39:4a:45:72:d0:fb:fd:07:0a:9a:44:2d:0f:4f:4d:a0:ed:3b:48] modulus: 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 public exponent: 10001 ] 2022-03-31 14:03:58.611 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:03:58.612 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:03:58.613 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:03:58.614 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:03:58.615 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:03:58.616 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:03:58.616 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:03:58.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:03:58.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:03:58.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:03:58.623 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:03:58.624 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:03:58.625 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:03:58.625 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:03:58.804 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:03:58.806 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:03:58.806 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:03:58.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:03:58.810 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:03:58.810 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:03:58.811 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:03:58.811 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:03:58.811 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:03:58.812 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:03:58.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:03:58.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:03:58.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:03:58.816 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:03:58.816 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:03:58.818 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:03:58.827 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:f1:e0:ed:fa:46:8e:7f:f9:2a:00:ae:26:08:4b:cd:2d:51:48:8a] modulus: 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 public exponent: 10001 ] 2022-03-31 14:05:46.984 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:05:46.985 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:05:46.987 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-31 14:05:46.987 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:05:46.988 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-31 14:05:46.989 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:05:46.989 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:05:46.989 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:05:46.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:05:46.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:05:46.995 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:05:46.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:05:46.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:05:46.997 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:05:47.177 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:05:47.178 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:05:47.179 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:05:47.179 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:05:47.182 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:05:47.182 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:05:47.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:05:47.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:05:47.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:05:47.184 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:05:47.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:05:47.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:05:47.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:05:47.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:05:47.187 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:05:47.188 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:05:47.193 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:66:f6:7b:41:67:6a:ee:c9:7d:d6:69:d9:f4:1a:95:26:51:8f:83] modulus: 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 public exponent: 10001 ] 2022-03-31 14:07:17.717 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:07:17.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:07:17.719 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-03-31 14:07:17.720 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:07:17.721 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-03-31 14:07:17.721 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:07:17.722 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:07:17.722 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:07:17.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:07:17.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:07:17.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:07:17.729 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:07:17.729 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:07:17.729 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:07:17.930 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:07:17.930 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:07:17.931 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:07:17.931 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:07:17.933 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:07:17.933 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:07:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:07:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:07:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:07:17.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:07:17.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:07:17.936 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:07:17.937 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:07:17.937 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:07:17.937 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:07:17.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:07:17.942 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:00:f4:68:fa:3a:b2:41:1c:ec:4b:3f:78:e3:59:c0:97:ea:5d:46] modulus: 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 public exponent: 10001 ] 2022-03-31 14:08:45.746 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:08:45.748 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:08:45.749 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 14:08:45.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:08:45.760 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 14:08:45.761 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:08:45.764 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:08:45.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:08:45.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:08:45.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:08:45.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:08:45.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:08:45.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:08:45.777 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:08:45.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:08:45.955 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:08:45.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:08:45.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:08:45.958 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:08:45.958 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:08:45.959 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:08:45.959 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:08:45.959 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:08:45.960 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:08:45.961 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:08:45.961 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:08:45.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:08:45.963 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:08:45.963 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:08:45.964 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:08:45.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:79:ad:a1:6f:58:59:bd:d3:93:1b:3f:25:49:88:d7:95:b7:b1:7d] modulus: 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 public exponent: 10001 ] 2022-03-31 14:08:55.409 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:08:55.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:08:55.414 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:08:55.415 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:08:55.415 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:08:55.415 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:08:55.416 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:08:55.416 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:08:55.416 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:08:55.417 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:08:55.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:08:55.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:08:55.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:08:55.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:08:55.588 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:08:55.589 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:08:55.592 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:08:55.593 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:08:55.595 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:08:55.595 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:08:55.595 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:08:55.596 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:08:55.597 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:08:55.603 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:08:55.604 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:08:55.604 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:08:55.610 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:08:55.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:08:55.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:08:55.612 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:08:55.618 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:ce:bc:fd:a1:e1:9c:bb:a8:dc:87:ce:4a:76:91:ab:b5:2c:c7:a8] modulus: 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 public exponent: 10001 ] 2022-03-31 14:09:22.632 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:09:22.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:09:22.635 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 14:09:22.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:09:22.636 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 14:09:22.637 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:09:22.637 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:09:22.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:09:22.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:09:22.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:09:22.643 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:09:22.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:09:22.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:09:22.645 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:09:22.866 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:09:22.867 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:09:22.867 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:09:22.868 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:09:22.869 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:09:22.869 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:09:22.870 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:09:22.870 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:09:22.871 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:09:22.872 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:09:22.872 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:09:22.873 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:09:22.873 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:09:22.874 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:09:22.874 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:09:22.875 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:09:22.878 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:18:51:3e:7e:38:f2:5c:ce:1e:a8:f7:23:ea:44:29:aa:1c:a8:1f] modulus: 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 public exponent: 10001 ] 2022-03-31 14:11:14.581 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:11:14.583 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:11:14.585 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:11:14.586 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:11:14.587 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:11:14.587 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:11:14.588 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:11:14.588 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:11:14.589 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:11:14.589 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:11:14.594 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:11:14.595 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:11:14.595 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:11:14.596 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:11:14.815 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:11:14.817 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:11:14.817 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:11:14.818 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:11:14.819 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:11:14.820 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:11:14.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:11:14.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:11:14.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:11:14.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:11:14.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:11:14.823 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:11:14.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:11:14.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:11:14.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:11:14.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:11:14.833 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:34:ac:0f:9f:4c:63:8f:27:33:4c:0a:df:8c:d0:5e:93:e5:0c:ca] modulus: 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 public exponent: 10001 ] 2022-03-31 14:14:36.601 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:14:36.603 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:14:36.604 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:14:36.604 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:14:36.604 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:14:36.605 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:14:36.605 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:14:36.606 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:14:36.606 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:14:36.606 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:14:36.611 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:14:36.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:14:36.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:14:36.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:14:36.796 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:14:36.797 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:14:36.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:14:36.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:14:36.799 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:14:36.804 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:14:36.805 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:14:36.805 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:14:36.805 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:14:36.806 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:14:36.806 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:14:36.807 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:14:36.807 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:14:36.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:14:36.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:14:36.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:14:36.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:b3:6e:12:2b:91:43:e2:3b:17:5f:02:e4:51:28:48:a6:48:dd:9a] modulus: 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 public exponent: 10001 ] 2022-03-31 14:18:11.321 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:18:11.323 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:18:11.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:18:11.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:18:11.327 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:18:11.327 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:18:11.328 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:18:11.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:18:11.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:18:11.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:18:11.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:18:11.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:18:11.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:18:11.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:18:11.572 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:18:11.573 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:18:11.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:18:11.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:18:11.575 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:18:11.575 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:18:11.576 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:18:11.576 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:18:11.576 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:18:11.577 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:18:11.577 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:18:11.578 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:18:11.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:18:11.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:18:11.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:18:11.580 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:18:11.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:90:b4:bd:a2:d7:ef:42:08:4c:43:b5:35:f5:09:d4:c1:f3:e0:a1] modulus: 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 public exponent: 10001 ] 2022-03-31 14:20:13.770 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:20:13.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:20:13.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:20:13.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:20:13.775 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:20:13.775 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:20:13.775 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:20:13.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:20:13.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:20:13.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:20:13.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:20:13.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:20:13.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:20:13.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:20:13.946 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:20:13.947 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:20:13.947 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:20:13.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:20:13.949 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:20:13.950 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:20:13.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:20:13.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:20:13.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:20:13.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:20:13.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:20:13.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:20:13.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:20:13.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:20:13.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:20:13.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:20:13.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:c7:4d:14:a3:4e:8f:45:e4:b0:b9:5c:33:c0:0c:75:90:1b:ea:45] modulus: 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 public exponent: 10001 ] 2022-03-31 14:23:48.131 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:23:48.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:23:48.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:23:48.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:23:48.135 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:23:48.136 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:23:48.136 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:23:48.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:23:48.137 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:23:48.137 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:23:48.142 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:23:48.143 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:23:48.143 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:23:48.143 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:23:48.305 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:23:48.306 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:23:48.306 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:23:48.307 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:23:48.308 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:23:48.308 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:23:48.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:23:48.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:23:48.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:23:48.310 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:23:48.310 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:23:48.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:23:48.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:23:48.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:23:48.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:23:48.313 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:23:48.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:78:ed:bc:ca:20:69:58:a1:e9:94:62:3a:8d:ee:71:54:75:fe:34] modulus: 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 public exponent: 10001 ] 2022-03-31 14:25:43.329 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:25:43.331 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:25:43.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:25:43.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:25:43.335 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:25:43.335 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:25:43.336 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:25:43.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:25:43.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:25:43.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:25:43.342 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:25:43.343 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:25:43.343 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:25:43.343 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:25:43.527 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:25:43.527 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:25:43.528 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:25:43.528 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:25:43.529 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:25:43.530 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:25:43.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:25:43.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:25:43.531 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:25:43.531 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:25:43.532 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:25:43.532 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:25:43.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:25:43.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:25:43.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:25:43.534 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:25:43.538 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:4f:88:8a:4f:05:56:79:4a:c5:1e:b6:63:8b:b1:33:85:85:9e:35] modulus: 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 public exponent: 10001 ] 2022-03-31 14:29:14.647 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:29:14.648 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:29:14.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:29:14.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:29:14.651 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:29:14.651 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:29:14.651 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:29:14.652 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:29:14.652 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:29:14.652 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:29:14.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:29:14.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:29:14.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:29:14.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:29:14.835 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:29:14.840 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:29:14.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:29:14.841 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:29:14.842 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:29:14.842 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:29:14.843 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:29:14.843 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:29:14.843 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:29:14.844 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:29:14.844 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:29:14.844 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:29:14.845 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:29:14.845 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:29:14.845 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:29:14.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:29:14.852 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:b0:38:f9:44:24:f2:98:ad:94:f1:bb:3c:78:33:45:0d:40:1d:cd] modulus: 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 public exponent: 10001 ] 2022-03-31 14:32:23.380 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:32:23.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:32:23.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:32:23.383 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:32:23.383 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:32:23.384 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:32:23.384 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:32:23.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:32:23.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:32:23.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:32:23.390 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:32:23.391 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:32:23.391 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:32:23.391 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:32:23.617 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:32:23.618 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:32:23.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:32:23.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:32:23.620 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:32:23.620 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:32:23.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:32:23.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:32:23.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:32:23.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:32:23.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:32:23.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:32:23.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:32:23.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:32:23.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:32:23.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:32:23.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:29:3f:a2:80:87:64:14:44:eb:80:be:f6:a0:f6:01:45:ac:c3:54] modulus: d0696e919586fafaeebe46ab23f44d65e6f36f4cac241b65c3058228ad2de8764c625138f99e539da33094f374de64dadebd0d51efb6dca41da0277cae6511e58ae3e54a1a4e04015a1cd098b6d8efb81535be89b4a97cd9852c044219462dde53065afc86da4a970e3474207a93003c71cde048c1da5c21c75cc6fc57e8e0a033434abc75f9d3357300cfe26f2c3a3601b4e537ece5248486496e3a6612d1d7917e3292127cb6e3876d7afbd947420a96a5c2f5c6e858397b03a4591351702c9b3cb225bce86833dd1b174008ab100d41fef263d74613f8045aff11643907bb457eca342125f05449f7bae0d85a7f88e7a8628da716ecad727db67020c7ab43 public exponent: 10001 ] 2022-03-31 14:35:53.026 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:35:53.028 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:35:53.030 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:35:53.030 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:35:53.031 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:35:53.031 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:35:53.032 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:35:53.032 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:35:53.032 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:35:53.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:35:53.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:35:53.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:35:53.039 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:35:53.039 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:35:53.273 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:35:53.273 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:35:53.273 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:35:53.274 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:35:53.275 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:35:53.275 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:35:53.275 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:35:53.276 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:35:53.276 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:35:53.276 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:35:53.277 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:35:53.277 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:35:53.277 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:35:53.278 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:35:53.278 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:35:53.278 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:35:53.282 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:c6:fd:c6:3c:86:73:9f:f0:c0:ca:7a:f6:3b:22:6e:ab:79:0e:cf] modulus: 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 public exponent: 10001 ] 2022-03-31 14:38:14.014 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:38:14.015 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:38:14.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 14:38:14.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:38:14.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 14:38:14.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:38:14.019 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:38:14.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:38:14.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:38:14.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:38:14.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:38:14.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:38:14.026 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:38:14.026 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:38:14.205 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:38:14.206 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:38:14.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:38:14.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:38:14.208 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:38:14.208 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:38:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:38:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:38:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:38:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:38:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:38:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:38:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:38:14.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:38:14.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:38:14.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:38:14.214 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:2c:89:a4:3a:15:56:2f:fa:6a:84:9a:32:c8:52:2f:c2:46:bd:eb] modulus: 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 public exponent: 10001 ] 2022-03-31 14:38:18.219 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:38:18.220 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:38:18.221 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 14:38:18.222 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:38:18.222 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 14:38:18.223 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:38:18.223 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:38:18.223 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:38:18.224 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:38:18.224 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:38:18.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:38:18.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:38:18.230 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:38:18.230 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:38:18.351 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:38:18.351 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:38:18.352 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:38:18.352 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:38:18.354 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:38:18.354 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:38:18.354 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:38:18.355 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:38:18.355 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:38:18.356 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:38:18.356 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:38:18.356 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:38:18.357 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:38:18.357 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:38:18.358 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:38:18.358 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:38:18.361 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:fa:19:e9:5f:50:6f:98:85:0b:66:5f:d2:07:1f:d3:ca:f5:ca:bb] modulus: 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 public exponent: 10001 ] 2022-03-31 14:40:54.853 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:40:54.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:40:54.856 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:40:54.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:40:54.857 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:40:54.858 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:40:54.858 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:40:54.859 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:40:54.859 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:40:54.860 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:40:54.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:40:54.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:40:54.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:40:54.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:40:55.005 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:40:55.006 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:40:55.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:40:55.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:40:55.007 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:40:55.008 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:40:55.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:40:55.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:40:55.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:40:55.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:40:55.010 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:40:55.010 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:40:55.011 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:40:55.011 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:40:55.011 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:40:55.012 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:40:55.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:d7:0c:07:26:f4:d1:e1:e7:2b:1b:e0:4f:d2:fd:23:34:b9:03:6e] modulus: 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 public exponent: 10001 ] 2022-03-31 14:44:50.787 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:44:50.790 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:44:50.792 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:44:50.792 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:44:50.793 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:44:50.794 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:44:50.794 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:44:50.794 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:44:50.795 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:44:50.795 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:44:50.800 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:44:50.800 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:44:50.801 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:44:50.801 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:44:51.027 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:44:51.028 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:44:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:44:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:44:51.031 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:44:51.031 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:44:51.031 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:44:51.032 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:44:51.032 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:44:51.033 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:44:51.033 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:44:51.033 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:44:51.034 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:44:51.034 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:44:51.034 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:44:51.035 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:44:51.039 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:87:84:c9:2a:f7:8c:53:89:4e:47:76:b7:e2:73:91:0d:ae:6c:69] modulus: dd43b641a1626f63607628a371df90752d2a0d909e12879a7fcd27918bb111cefc0f475e57b88a6828b5a0d839101d50724af13f9994e2289a1bcdc7e3a966f788894228e1f232b88b0425f5d13b385bdbc28dec2c047c20b711e3e8f3f32d1f68746896f1e4c7cd2af036e78ee770cbcd4dd7a927e30462713db944c8cc0c8a5af29a681e2d1fcca4dd5d4be0380ede1e52b11d4c6fd1e628a4f5c314925cd6abbbf9438c764a4d36bb9cacbf328b36e32af1186e965dc597f967c1a5f90450fa944daccc8a32985177f110a98d2ef1570d134f5bf409f23e4fa5e9f6f13acacdaf38593475563998752bd0c638c88a86cea6481d57576fe87de3a6780734e9 public exponent: 10001 ] 2022-03-31 14:51:49.504 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:51:49.507 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:51:49.509 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:51:49.509 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:51:49.510 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:51:49.510 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:51:49.510 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:51:49.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:51:49.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:51:49.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:51:49.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:51:49.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:51:49.518 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:51:49.518 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:51:49.755 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:51:49.756 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:51:49.756 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:51:49.756 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:51:49.758 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:51:49.758 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:51:49.758 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:51:49.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:51:49.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:51:49.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:51:49.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:51:49.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:51:49.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:51:49.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:51:49.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:51:49.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:51:49.765 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0e:5f:61:29:be:1a:3a:6a:d5:f3:72:57:3e:f6:d5:62:01:ab:df:fc] modulus: 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 public exponent: 10001 ] 2022-03-31 14:55:33.137 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 14:55:33.138 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 14:55:33.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:55:33.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 14:55:33.141 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-31 14:55:33.141 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 14:55:33.142 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 14:55:33.142 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 14:55:33.142 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 14:55:33.143 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 14:55:33.147 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 14:55:33.147 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:55:33.148 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 14:55:33.148 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:55:33.307 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 14:55:33.307 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 14:55:33.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 14:55:33.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 14:55:33.309 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 14:55:33.310 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 14:55:33.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:55:33.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:55:33.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:55:33.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:55:33.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:55:33.312 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:55:33.312 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 14:55:33.312 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 14:55:33.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 14:55:33.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 14:55:33.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: cc3157e190c557ae8f48ba0f6b72c10da960629865bb83663e6c5ea3dd42379f0c9e31dd28009b5bd40d9f892af9e394404358cdf96aee646fad9ebff040110b4c5aac192bc5a2b2f08fe24c28ddfa7dda34aa4baa7d7fcfec910fbd844509b6f0858cd3308f8e276beed0f9e1d80039304059fa332a059c84d66bebe2b49d370d6f9c1f601e0e2058bdf50023d0d90f0dab10d1a6ce4b361e636df712d806311628327a5f2f75fa35380958a0356cca487d59c680a895daefcf8e5e7a87aa1e0bded71c1ea4a1e0b5d0bc71db627dc19c28fef8b46c1b4b756b309952655aa5c4d6cc812767043c3c81f20d363edae179aaf62d8069576337f9fb095d76c30c42884ef713703414504ecd41eba9b675190a0a0295d4727324d8ff8d21e73a7cb93d766320878323ad758638cc713f8cf2750d107b3bdaa5625ae3dbe66a62aee739d6ae430f1b4382526103560c505ab2faac9b51721ae635c2a5230e6e7f01bddd013ad776fd0a61298d61f2d0a08f67b78e0a573119b5852fd2390a143f6d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:08:13:d9:0c:c6:5c:85:82:cd:2e:51:21:0e:0b:8c:d6:a1:1d:32] modulus: bbb1e1ed339bf0f461f8d3b2f3b8279b56db5a644e42d72183a848c44f71542a0a4a8e7fa57099b2fb745bc23775559429630ae4d42f70c8cecbca5cb148f0b4fa6a26fa9ea12ad72e9621930e8147de3d5f892f95fa756f330445a2f79c362736926d8c803cd2499e0b0352137203af4de6d1e407a2cf0ce1c324c33c40bb678fe955128160ac9230176c0be0395b72cd054456f1913d4fde20f926c7ae209faca16b92dab5c947462ccba8f6daf786c5a19588bd570cb547df8698d8ac1abacd2236477683304ebaa210ea3d21decc1e4efdc7bc0a18607d643a08bea2d298d252f2ef9423fbaebea29b69d65c45574d1b9148abe70e71d4c65d4db060a10b public exponent: 10001 ] 2022-03-31 15:02:16.276 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 15:02:16.278 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 15:02:16.280 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 15:02:16.281 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 15:02:16.281 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-03-31 15:02:16.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 15:02:16.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 15:02:16.282 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 15:02:16.283 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 15:02:16.283 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 15:02:16.288 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 15:02:16.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 15:02:16.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 15:02:16.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 15:02:16.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 15:02:16.450 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 15:02:16.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 15:02:16.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 15:02:16.452 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 15:02:16.452 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 15:02:16.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 15:02:16.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 15:02:16.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 15:02:16.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 15:02:16.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 15:02:16.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 15:02:16.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 15:02:16.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 15:02:16.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 15:02:16.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 15:02:16.460 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:38:49:dd:f9:ac:69:ab:e6:5f:c9:df:c1:ee:e2:47:be:df:64:22] modulus: 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 public exponent: 10001 ] 2022-03-31 15:02:21.250 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-31 15:02:21.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-31 15:02:21.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 15:02:21.253 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-31 15:02:21.253 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-03-31 15:02:21.254 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-31 15:02:21.254 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-31 15:02:21.254 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-31 15:02:21.255 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-31 15:02:21.255 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-31 15:02:21.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-31 15:02:21.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 15:02:21.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-31 15:02:21.261 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 15:02:21.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-31 15:02:21.381 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-31 15:02:21.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-31 15:02:21.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-31 15:02:21.384 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-31 15:02:21.384 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-31 15:02:21.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 15:02:21.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 15:02:21.386 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 15:02:21.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 15:02:21.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 15:02:21.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 15:02:21.388 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-31 15:02:21.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-31 15:02:21.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-31 15:02:21.390 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-31 15:02:21.393 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618190893503127197575013523374170316258285343581 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 31 12:45:20 UTC 2022 Final Date: Tue Mar 30 12:45:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:51:01:26:45:76:d5:b0:5a:b9:ef:53:f9:15:14:0e:9e:e8:d1:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b5424e90523f68300e7f677b6f6a8b2ffc1057c7 3d378dcd0514d479fce6d192bded604e1f7d844d 105165cb4fc4988d203b0097b1a2187e54133697 7bcd94e77e17d7105913f767e5e536a7627431b8 e83376178ed8a0810b86b47309b80708b2cd8a34 4a615572d885599f255b3387b355905022b0e088 bbd81809c732dc8673194d0fa2aa31ac717d9410 6101c148318ecdf43c74d75a061380ace11fddff 338e15cd71cb12bdcafeece082bba2d85ebc06d0 5576fcb2a4b4f9d1890d5fc13806c1ca5480148a da055ca96994f8c52286b2e83ced95f6c2ee34bf 6cd1cc8feda291f86349ca50dfdbec49f4ae9b1d f8d64210457d86533156523b6b7f9ba0844ae72b bc35e5b423e044bb519ed988acc3a4cc33e0ff33 34bc5069df034793c6b5d4e95904b175909712cb 4dab8b136aa7e4798602eb82fa067c09fff5af81 7213dba126f950e9b125db6f0bdab564e06847e9 5a656d588225f2189112e96f35069441febaebe8 85c2bb028003dce3fc16b7f086bb9d98d151325b d9b83780 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:d9:77:04:2c:ca:dd:80:de:09:c1:85:8d:b3:09:90:59:61:58:db] modulus: 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 public exponent: 10001 ]