By type
2022-04-08 05:37:35,212 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-08 05:37:37,811 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-08 05:37:39.133 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Apr 08, 2022 5:37:43 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 08, 2022 5:37:43 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 08, 2022 5:37:43 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 08, 2022 5:37:43 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-08 05:37:45.132 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-08 05:37:46.367 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-04-08 05:37:46.742 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-08 05:37:48.266 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-08 05:37:48.274 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-08 05:37:48.277 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-08 05:37:48.285 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-08 05:37:48.362 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-08 05:37:48.367 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-08 05:37:48.594 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-04-08 05:37:49.809 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 08, 2022 5:37:51 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-08 05:37:51.675 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 19.112 seconds (JVM running for 24.046) Apr 08, 2022 5:38:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-08 08:18:02.784 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:18:02.806 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:18:02.916 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-08 08:18:02.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:18:02.978 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-08 08:18:02.989 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:18:02.991 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:18:02.993 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:18:02.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:18:03.000 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:18:03.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:18:03.031 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:18:03.107 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:18:03.118 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:18:03.119 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:18:03.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:18:04.414 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:18:04.423 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:18:04.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:18:04.447 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:18:04.472 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:18:04.474 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:18:04.476 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:18:04.477 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:18:04.478 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:18:04.509 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:18:04.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:18:04.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:18:04.522 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:18:04.523 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:18:04.523 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:18:04.527 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:18:04.574 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:20:60:14:7e:b1:63:f6:a6:f0:ba:91:ea:47:a1:93:60:fa:13:41] modulus: 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 public exponent: 10001 ] 2022-04-08 08:18:09.737 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:18:09.745 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:18:09.749 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:18:09.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:18:09.753 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:18:09.754 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:18:09.755 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:18:09.756 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:18:09.756 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:18:09.757 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:18:09.789 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:18:09.790 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:18:09.791 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:18:09.792 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:18:10.079 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:18:10.080 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:18:10.081 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:18:10.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:18:10.086 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:18:10.088 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:18:10.089 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:18:10.089 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:18:10.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:18:10.094 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:18:10.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:18:10.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:18:10.097 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:18:10.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:18:10.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:18:10.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:18:10.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:07:18:4b:7c:7d:a9:88:c3:3c:9d:f7:e0:7e:44:71:a4:31:8f:4a] modulus: b83faee031cd497d1ffc0db1ef08b5317993b52f8041982439a278cebec1b6a8dc43fdaa57088393e2be8d6fcd2b12255fc661b28e32b21353d0c9ee3f7ca904789f44fa8c1dd95cac7e3c14f1e36ac17dc71290b9f4c01b8b06dcc4d2a36342727e3ed5424dcaa03465f64f3e2c5896b2ee02a7ecada2ed99bbffa105d2c657082d1d8d645703efd26c9fe64ffdfca72d7c469337c3c5cfed5c9c275ce5c427616f0eb04b19121f841db1e9f44f1cff56b6b3f84b82c049301f8770848457fb49e3ecab7029f2b57380d08e543354e57657b6f9082141fece98e7f1fa02093a66de258a14016def16f4b075c42ae0ee39571e4665ffc8ecde7fa2c153beb045 public exponent: 10001 ] 2022-04-08 08:20:14.062 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:20:14.065 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:20:14.068 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-08 08:20:14.070 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:20:14.071 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-08 08:20:14.073 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:20:14.074 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:20:14.076 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:20:14.077 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:20:14.082 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:20:14.092 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:20:14.093 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:20:14.094 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:20:14.095 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:20:14.387 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:20:14.394 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:20:14.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:20:14.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:20:14.399 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:20:14.400 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:20:14.401 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:20:14.401 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:20:14.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:20:14.423 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:20:14.424 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:20:14.425 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:20:14.429 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:20:14.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:20:14.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:20:14.433 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:20:14.441 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:87:48:0f:96:4c:20:53:d1:9a:18:25:d8:e6:0d:9a:4a:0c:b1:57] modulus: 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 public exponent: 10001 ] 2022-04-08 08:22:19.500 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:22:19.504 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:22:19.507 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-08 08:22:19.508 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:22:19.508 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-08 08:22:19.509 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:22:19.510 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:22:19.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:22:19.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:22:19.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:22:19.522 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:22:19.523 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:22:19.523 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:22:19.524 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:22:19.875 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:22:19.876 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:22:19.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:22:19.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:22:19.889 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:22:19.890 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:22:19.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:22:19.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:22:19.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:22:19.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:22:19.894 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:22:19.894 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:22:19.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:22:19.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:22:19.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:22:19.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:22:19.907 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:d6:70:b3:05:80:78:d9:0c:d1:a0:d1:d3:91:20:1f:62:84:61:93] modulus: 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 public exponent: 10001 ] 2022-04-08 08:24:46.816 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:24:46.822 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:24:46.826 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:24:46.827 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:24:46.828 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:24:46.829 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:24:46.830 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:24:46.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:24:46.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:24:46.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:24:46.845 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:24:46.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:24:46.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:24:46.848 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:24:47.197 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:24:47.198 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:24:47.199 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:24:47.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:24:47.202 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:24:47.203 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:24:47.204 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:24:47.204 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:24:47.205 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:24:47.207 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:24:47.208 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:24:47.208 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:24:47.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:24:47.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:24:47.211 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:24:47.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:24:47.219 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: d5e5066ceeced4052d18c8c6763dae0fbee27b95bed050f38253d94ec4f9acb6e50e7f9a3fe721bf5a23b2808f1d7ed39b25c2557b4889afd35786cc954f6982435b2af6f5de32e3c2f75d825f2bba9590992762ec1c3548d22e0ad5bd941834bcb8e3d84fa326a5427bf755a5e4475372a5f3b181bf80f795b40b73667ad0a658c293a63733e106273c3a91f2ffc371b4aa8859d45690a27dc702fae909c01f67483c76e22b82838d9de1b418b3be1ec4476e17cec0f2866778da547d288042912eca9a6c86d17ea65e249aed54ec88e3f4cc8ca67854836478d6572da9c2127474acf6208756dbfd8145a63f224ae32b91766ec4b71ed895258c691dd78635a3c5f5a9333e620b99ce6700c91e3d043d6dc31ab9bc1beee84df8bfefdc5b9c8e4b39c3ee9af335244e0801cc139debbe6de9ce6e6ff3e07f4a2cca2540dbb5ef541baad67f9b4ef3dede3548cf15534c29e047ffac5bc4fba29350ebed8b4f225c0117f92c7c1c2df902ffd2ee973d9189c8726a69c560a4d000d2a3fd0fd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:3e:4f:16:c3:96:e4:9b:4e:b9:de:b1:10:b7:60:02:9a:08:42:ba] modulus: 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 public exponent: 10001 ] 2022-04-08 08:25:58.686 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:25:58.688 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:25:58.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 08:25:58.691 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:25:58.692 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 08:25:58.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:25:58.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:25:58.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:25:58.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:25:58.695 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:25:58.703 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:25:58.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:25:58.706 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:25:58.706 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:25:58.970 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:25:58.971 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:25:58.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:25:58.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:25:58.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:25:58.976 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:25:58.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:25:58.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:25:58.981 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:25:58.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:25:58.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:25:58.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:25:58.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:25:58.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:25:58.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:25:58.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:25:58.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:91:e1:f2:5b:33:93:fc:de:a2:cd:3d:72:13:39:7b:da:9d:df:b5] modulus: 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 public exponent: 10001 ] 2022-04-08 08:26:24.756 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:26:24.765 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:26:24.768 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-08 08:26:24.772 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:26:24.773 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-08 08:26:24.774 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:26:24.775 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:26:24.776 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:26:24.776 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:26:24.778 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:26:24.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:26:24.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:26:24.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:26:24.800 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:26:25.056 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:26:25.057 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:26:25.057 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:26:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:26:25.081 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:26:25.082 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:26:25.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:26:25.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:26:25.084 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:26:25.085 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:26:25.085 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:26:25.086 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:26:25.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:26:25.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:26:25.088 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:26:25.089 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:26:25.095 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:bd:77:77:b6:83:5a:12:3f:05:1e:5f:48:94:b7:a0:86:94:a3:c6] modulus: a39077368507a6765446ccde8b9030a526ede7bdd1e64930224c70db5cac37e29f875903361db3ed6373c8bd28e30fcbb3bda7424e72696d80fee2d51f57be9935206d28c18c8f5de3cbf5a25ca38659b469453f0905209ccc9f04e7d03195adf98a677cc269733dce39341aa2af08d9d9c35ef734e13bf7fe7cd2e379a8bda7f09046064bec194bdbb7df595fafb2a97ed80e04dfa8091ac62ecb4d31ddbc344ca2b42912ad0621e8dd3a319601cf7acceea9a6617d8031a59a5aa3bd73d1b93edb1f44215145234c8d306952111e38ccdb459762a3677db2472208cf53729544bd21cb2f6413c63bdcd88e5e1b4fa490d4229eb951978c3a4c2e4cfcef4765 public exponent: 10001 ] 2022-04-08 08:29:02.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:29:02.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:29:02.298 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:29:02.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:29:02.299 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:29:02.300 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:29:02.301 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:29:02.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:29:02.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:29:02.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:29:02.307 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:29:02.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:29:02.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:29:02.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:29:02.675 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:29:02.676 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:29:02.676 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:29:02.676 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:29:02.679 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:29:02.679 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:29:02.680 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:29:02.680 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:29:02.681 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:29:02.682 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:29:02.683 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:29:02.683 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:29:02.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:29:02.687 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:29:02.688 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:29:02.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:29:02.703 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: d5e5066ceeced4052d18c8c6763dae0fbee27b95bed050f38253d94ec4f9acb6e50e7f9a3fe721bf5a23b2808f1d7ed39b25c2557b4889afd35786cc954f6982435b2af6f5de32e3c2f75d825f2bba9590992762ec1c3548d22e0ad5bd941834bcb8e3d84fa326a5427bf755a5e4475372a5f3b181bf80f795b40b73667ad0a658c293a63733e106273c3a91f2ffc371b4aa8859d45690a27dc702fae909c01f67483c76e22b82838d9de1b418b3be1ec4476e17cec0f2866778da547d288042912eca9a6c86d17ea65e249aed54ec88e3f4cc8ca67854836478d6572da9c2127474acf6208756dbfd8145a63f224ae32b91766ec4b71ed895258c691dd78635a3c5f5a9333e620b99ce6700c91e3d043d6dc31ab9bc1beee84df8bfefdc5b9c8e4b39c3ee9af335244e0801cc139debbe6de9ce6e6ff3e07f4a2cca2540dbb5ef541baad67f9b4ef3dede3548cf15534c29e047ffac5bc4fba29350ebed8b4f225c0117f92c7c1c2df902ffd2ee973d9189c8726a69c560a4d000d2a3fd0fd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:56:37:40:fb:75:80:9c:1f:7d:91:f0:57:54:1f:ed:27:31:75:87] modulus: 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 public exponent: 10001 ] 2022-04-08 08:33:45.667 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:33:45.673 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:33:45.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:33:45.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:33:45.678 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:33:45.679 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:33:45.681 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:33:45.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:33:45.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:33:45.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:33:45.691 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:33:45.692 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:33:45.693 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:33:45.693 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:33:46.016 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:33:46.018 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:33:46.018 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:33:46.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:33:46.021 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:33:46.021 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:33:46.022 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:33:46.022 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:33:46.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:33:46.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:33:46.025 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:33:46.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:33:46.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:33:46.029 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:33:46.029 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:33:46.031 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:33:46.038 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:95:39:d8:dd:87:75:89:0e:b1:b1:eb:5a:6c:64:5d:07:7a:6f:2d] modulus: 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 public exponent: 10001 ] 2022-04-08 08:33:46.327 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:33:46.328 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:33:46.331 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:33:46.332 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:33:46.333 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:33:46.334 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:33:46.335 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:33:46.336 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:33:46.336 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:33:46.337 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:33:46.345 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:33:46.348 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:33:46.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:33:46.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:33:46.499 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:33:46.500 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:33:46.501 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:33:46.503 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:33:46.509 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:33:46.510 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:33:46.511 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:33:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:33:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:33:46.514 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:33:46.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:33:46.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:33:46.517 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:33:46.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:33:46.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:33:46.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:33:46.528 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:95:39:d8:dd:87:75:89:0e:b1:b1:eb:5a:6c:64:5d:07:7a:6f:2d] modulus: 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 public exponent: 10001 ] 2022-04-08 08:38:38.363 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:38:38.365 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:38:38.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:38:38.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:38:38.369 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:38:38.370 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:38:38.371 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:38:38.371 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:38:38.372 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:38:38.373 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:38:38.378 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:38:38.380 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:38:38.381 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:38:38.381 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:38:38.756 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:38:38.756 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:38:38.757 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:38:38.757 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:38:38.759 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:38:38.759 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:38:38.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:38:38.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:38:38.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:38:38.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:38:38.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:38:38.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:38:38.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:38:38.764 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:38:38.764 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:38:38.766 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:38:38.773 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: d5e5066ceeced4052d18c8c6763dae0fbee27b95bed050f38253d94ec4f9acb6e50e7f9a3fe721bf5a23b2808f1d7ed39b25c2557b4889afd35786cc954f6982435b2af6f5de32e3c2f75d825f2bba9590992762ec1c3548d22e0ad5bd941834bcb8e3d84fa326a5427bf755a5e4475372a5f3b181bf80f795b40b73667ad0a658c293a63733e106273c3a91f2ffc371b4aa8859d45690a27dc702fae909c01f67483c76e22b82838d9de1b418b3be1ec4476e17cec0f2866778da547d288042912eca9a6c86d17ea65e249aed54ec88e3f4cc8ca67854836478d6572da9c2127474acf6208756dbfd8145a63f224ae32b91766ec4b71ed895258c691dd78635a3c5f5a9333e620b99ce6700c91e3d043d6dc31ab9bc1beee84df8bfefdc5b9c8e4b39c3ee9af335244e0801cc139debbe6de9ce6e6ff3e07f4a2cca2540dbb5ef541baad67f9b4ef3dede3548cf15534c29e047ffac5bc4fba29350ebed8b4f225c0117f92c7c1c2df902ffd2ee973d9189c8726a69c560a4d000d2a3fd0fd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:f7:6c:a3:eb:9d:2c:0f:e5:07:75:17:1a:59:46:82:c6:87:f6:9d] modulus: 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 public exponent: 10001 ] 2022-04-08 08:42:34.788 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:42:34.791 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:42:34.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:42:34.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:42:34.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:42:34.797 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:42:34.797 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:42:34.798 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:42:34.798 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:42:34.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:42:34.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:42:34.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:42:34.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:42:34.812 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:42:35.089 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:42:35.090 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:42:35.091 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:42:35.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:42:35.097 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:42:35.098 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:42:35.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:42:35.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:42:35.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:42:35.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:42:35.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:42:35.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:42:35.103 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:42:35.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:42:35.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:42:35.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:42:35.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:e2:4b:55:68:ff:14:57:7d:7a:b0:1b:29:0b:fb:ba:26:06:4f:a5] modulus: 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 public exponent: 10001 ] 2022-04-08 08:47:20.059 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:47:20.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:47:20.065 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:47:20.067 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:47:20.067 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:47:20.068 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:47:20.068 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:47:20.069 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:47:20.069 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:47:20.070 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:47:20.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:47:20.079 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:47:20.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:47:20.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:47:20.418 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:47:20.418 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:47:20.419 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:47:20.419 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:47:20.423 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:47:20.423 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:47:20.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:47:20.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:47:20.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:47:20.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:47:20.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:47:20.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:47:20.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:47:20.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:47:20.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:47:20.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:47:20.438 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:d6:5b:86:88:42:50:cb:b8:65:a6:d9:51:7b:f5:e6:7e:17:bc:17] modulus: bf13d5b544bfd576109a9e5739d49f0e8b4549d99c9f201ae3d423d3b892039d784819de023e70ba64d2fc0646d33726347c6ebeb15457617ea8d9cfc33747973d2dd33e6dbf73e3f6aa25d41117a8ef95777240fcaf0d0c785b9854285d3d96de40b379a159f5d83b0ffe639d71cd29d0c21e7aaf8f92a3cc965d752dfd8d14a50789bd5daee47432a15acc476047f03208394cee0ae03f4b1ac7bbeb091de73473d7109431514420eba95d878690c4f8660367d1c675a11a68cb4b1b0e39d5b985cdadc53b89640df56fdac23acd3c39a4db946c962c7acea3cc9e49f2df6baad997e96cb7f40907bfc5b472e029ded2f0066040fe722af163a13fb3b55a7b public exponent: 10001 ] 2022-04-08 08:51:28.889 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:51:28.902 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:51:28.905 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:51:28.911 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:51:28.915 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:51:28.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:51:28.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:51:28.917 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:51:28.917 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:51:28.918 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:51:28.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:51:28.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:51:28.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:51:28.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:51:29.315 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:51:29.316 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:51:29.317 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:51:29.318 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:51:29.323 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:51:29.324 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:51:29.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:51:29.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:51:29.327 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:51:29.328 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:51:29.329 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:51:29.329 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:51:29.330 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:51:29.331 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:51:29.331 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:51:29.333 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:51:29.342 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:9a:ba:97:da:1c:d7:9a:c7:d3:c0:db:54:d1:1a:3f:e1:c3:76:30] modulus: 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 public exponent: 10001 ] 2022-04-08 08:54:15.755 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:54:15.758 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:54:15.768 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 08:54:15.770 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:54:15.771 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 08:54:15.772 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:54:15.775 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:54:15.776 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:54:15.776 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:54:15.777 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:54:15.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:54:15.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:54:15.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:54:15.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:54:16.022 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:54:16.023 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:54:16.023 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:54:16.024 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:54:16.026 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:54:16.026 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:54:16.026 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:54:16.027 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:54:16.027 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:54:16.028 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:54:16.028 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:54:16.029 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:54:16.030 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:54:16.030 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:54:16.030 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:54:16.031 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:54:16.037 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:f6:ad:a1:c8:96:a7:4e:a0:6e:af:62:64:c6:37:1a:79:9d:52:cd] modulus: c5f3f9704cb04f4989c979d746072e39e40d9f300eb6ac7d533ca5e8b0acae85141fdbd89249e912d2096d3d86b8636614bb07fcb95537ec5ea3017e636885b7d9d337938258be486622154db9045f0fbc8bc335ac46910ba88276725e945028401ab3dbf605369de877ff304a547d39536a0438d564b1aeb10816b8538756bd0544c7e32ef34a3e48454142166f627ec8899a52bf6aece91887f44a58660e108cfbefd74bdb4ed8d9d1e2d0aa00e3587931de529e79c4b86168c6fb5d60618732bf8f70c98c9c36dd502971d3452902e713b53530370663c7489d22712c8687c1e8e21220a53a8c00991a7dce23818440816d2ebf6f267f73fba1322d5e08e7 public exponent: 10001 ] 2022-04-08 08:54:43.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:54:43.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:54:43.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-08 08:54:43.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:54:43.068 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-08 08:54:43.068 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:54:43.069 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:54:43.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:54:43.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:54:43.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:54:43.076 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:54:43.076 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:54:43.077 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:54:43.077 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:54:43.379 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:54:43.380 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:54:43.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:54:43.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:54:43.383 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:54:43.383 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:54:43.383 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:54:43.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:54:43.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:54:43.385 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:54:43.385 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:54:43.385 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:54:43.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:54:43.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:54:43.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:54:43.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:54:43.392 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:56:0d:2b:83:54:d8:84:d2:a6:42:af:cd:63:1e:0b:f1:bf:8f:70] modulus: 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 public exponent: 10001 ] 2022-04-08 08:56:12.935 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 08:56:12.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 08:56:12.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:56:12.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 08:56:12.940 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 08:56:12.941 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 08:56:12.942 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 08:56:12.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 08:56:12.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 08:56:12.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 08:56:12.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 08:56:12.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:56:12.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 08:56:12.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:56:13.265 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 08:56:13.266 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 08:56:13.266 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 08:56:13.267 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 08:56:13.269 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 08:56:13.269 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 08:56:13.270 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:56:13.270 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:56:13.271 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:56:13.271 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:56:13.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:56:13.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:56:13.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 08:56:13.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 08:56:13.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 08:56:13.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 08:56:13.279 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:b2:13:72:dd:da:7e:c9:b3:d2:0d:0c:3f:1f:80:bd:92:a9:9f:a4] modulus: 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 public exponent: 10001 ] 2022-04-08 09:00:43.809 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:00:43.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:00:43.813 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:00:43.814 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:00:43.815 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:00:43.815 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:00:43.816 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:00:43.816 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:00:43.816 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:00:43.817 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:00:43.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:00:43.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:00:43.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:00:43.826 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:00:44.143 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:00:44.144 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:00:44.144 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:00:44.144 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:00:44.146 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:00:44.146 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:00:44.146 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:00:44.147 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:00:44.147 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:00:44.147 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:00:44.148 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:00:44.148 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:00:44.149 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:00:44.149 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:00:44.149 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:00:44.149 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:00:44.153 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:8e:c5:5e:57:f1:5d:9e:20:d3:ed:46:63:96:31:1c:03:ba:94:17] modulus: c4991671373645ab0ac93fb0b2ff356065ee06b99cf97da7a23b496d71a7183426e94eb5988c45b34a97f73dc756d01276bd9335513ebe8784130b1b29e9cb9e8b61ea025d9e931154d594802533af5fd11e155e9cc8fb7a7017c1917e47cd07302776cd202ecb50295d205bd48d081ca80b97dbab67538318826011b1c3ef2af70e794c6bf89bde6b35087979b7208756deaeb762e3fdaea4baf7e16e3291fa75ae9f831cf12c83d1adb9cdb6f7ffb30edb769184169eb55efde04a864abb106b5abb4926e8f313998b37aff92ded895e828b978361f5d00ffb882f4a017300a9bb71b97aba887a3f3773b83383ffe26ef5f598d5331449f087559310b36e87 public exponent: 10001 ] 2022-04-08 09:05:29.844 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:05:29.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:05:29.854 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:05:29.856 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:05:29.857 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:05:29.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:05:29.859 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:05:29.860 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:05:29.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:05:29.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:05:29.877 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:05:29.880 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:05:29.880 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:05:29.881 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:05:30.243 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:05:30.244 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:05:30.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:05:30.245 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:05:30.247 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:05:30.247 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:05:30.248 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:05:30.248 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:05:30.249 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:05:30.250 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:05:30.250 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:05:30.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:05:30.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:05:30.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:05:30.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:05:30.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:05:30.262 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:e6:cd:67:4f:57:f1:30:09:ab:ff:16:58:28:60:dc:b1:dc:10:66] modulus: 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 public exponent: 10001 ] 2022-04-08 09:11:59.921 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:11:59.923 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:11:59.925 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:11:59.926 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:11:59.927 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:11:59.928 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:11:59.928 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:11:59.929 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:11:59.929 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:11:59.930 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:11:59.937 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:11:59.939 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:11:59.939 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:11:59.940 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:12:00.195 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:12:00.196 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:12:00.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:12:00.197 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:12:00.208 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:12:00.209 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:12:00.209 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:12:00.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:12:00.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:12:00.211 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:12:00.211 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:12:00.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:12:00.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:12:00.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:12:00.213 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:12:00.213 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:12:00.217 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:c3:e8:90:23:98:00:83:aa:a8:5b:43:92:54:90:d6:3b:2f:59:0a] modulus: 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 public exponent: 10001 ] 2022-04-08 09:17:03.985 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:17:03.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:17:03.991 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:17:03.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:17:03.993 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:17:03.994 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:17:03.995 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:17:03.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:17:03.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:17:03.996 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:17:04.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:17:04.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:17:04.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:17:04.004 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:17:04.238 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:17:04.239 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:17:04.240 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:17:04.240 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:17:04.242 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:17:04.242 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:17:04.242 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:17:04.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:17:04.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:17:04.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:17:04.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:17:04.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:17:04.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:17:04.245 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:17:04.245 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:17:04.245 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:17:04.249 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:13:fa:6f:b1:49:30:52:ed:45:30:99:5b:fb:38:1c:8f:20:fa:25] modulus: b40dc5df29e417164dddcf884c5615bf72b631c26be3b88538ca68be34fe17d55f31d79ddbd83e8043e9ead975784d1d4f08203c21ac8107bb5f4111844a59299dbf5dc04425e2699267b75dce737c6c56a5d46e35d42af8a23eb2d7afcba741ac26f268d6fe7b6b5851e9a05bc90a30a63e0661df01c737f6c1f1995b24b0e268ef9b60aa0bac48e9749eddf685f40f6c349fe1c4bb30b2487ae13fd81b842978710d0bf135da7922b705de65e6db6d5579203cb78a9208b732cbb83d11c52c78fa453cda7c661a49a5d60ed34d455169b5ca92032cca866be15e80ffd3c4a53267309898d5593a21072b85277d0964812c1a093979bcd4b6b2a43444bf46b9 public exponent: 10001 ] 2022-04-08 09:23:54.001 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:23:54.005 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:23:54.009 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 09:23:54.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:23:54.016 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 09:23:54.023 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:23:54.024 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:23:54.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:23:54.025 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:23:54.025 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:23:54.032 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:23:54.034 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:23:54.034 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:23:54.034 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:23:54.090 [31mERROR[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at jdk.internal.reflect.GeneratedMethodAccessor69.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-08 09:23:54.126 [31mERROR[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at jdk.internal.reflect.GeneratedMethodAccessor69.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 60 more 2022-04-08 09:26:19.721 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:26:19.724 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:26:19.730 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:26:19.732 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:26:19.732 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:26:19.733 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:26:19.733 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:26:19.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:26:19.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:26:19.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:26:19.744 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:26:19.745 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:26:19.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:26:19.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:26:20.032 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:26:20.032 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:26:20.033 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:26:20.033 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:26:20.057 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:26:20.058 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:26:20.058 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:26:20.059 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:26:20.059 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:26:20.060 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:26:20.060 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:26:20.061 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:26:20.061 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:26:20.072 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:26:20.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:26:20.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:26:20.080 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:1c:9e:a4:3f:12:30:85:e7:71:80:3e:02:b4:e7:f8:f1:8f:2f:fc] modulus: b98bee8b8100ee6f078177a80956e3cc562056c8cdb5859d82de14496b2c96920894d6fb5d791c9015491769b53168d5958307493e12ccb840958187d83cbd49dd71eb33f0bda40dfc8a8cbeebb6a356f7d13579767b8f74b9ee10c3b5aecdcaaa3e535914992f0cee60ee549a36e1f5a7833ce447a1f964f02c2b223cb5bec979f2e82d0fdc6b7249ae6285595ee93a63013b14b1c407b01f653836fac75481dfdb86403727bf0e63b8de644c78c12dadaf3b526463d48a3dded9a77575ab9cb3573c10648c7c6137c25e3c257e5eb0e2499e4b86303ee12774d279497a598249fb3e2a3135936b286d57ae501677449cbb8938abd757b23b07457961dd04ab public exponent: 10001 ] 2022-04-08 09:31:19.416 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:31:19.417 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:31:19.419 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:31:19.419 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:31:19.420 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-08 09:31:19.421 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:31:19.421 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:31:19.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:31:19.422 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:31:19.422 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:31:19.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:31:19.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:31:19.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:31:19.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:31:19.664 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:31:19.664 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:31:19.665 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:31:19.665 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:31:19.666 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:31:19.666 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:31:19.666 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:31:19.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:31:19.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:31:19.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:31:19.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:31:19.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:31:19.669 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:31:19.669 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:31:19.669 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:31:19.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:31:19.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: d5e5066ceeced4052d18c8c6763dae0fbee27b95bed050f38253d94ec4f9acb6e50e7f9a3fe721bf5a23b2808f1d7ed39b25c2557b4889afd35786cc954f6982435b2af6f5de32e3c2f75d825f2bba9590992762ec1c3548d22e0ad5bd941834bcb8e3d84fa326a5427bf755a5e4475372a5f3b181bf80f795b40b73667ad0a658c293a63733e106273c3a91f2ffc371b4aa8859d45690a27dc702fae909c01f67483c76e22b82838d9de1b418b3be1ec4476e17cec0f2866778da547d288042912eca9a6c86d17ea65e249aed54ec88e3f4cc8ca67854836478d6572da9c2127474acf6208756dbfd8145a63f224ae32b91766ec4b71ed895258c691dd78635a3c5f5a9333e620b99ce6700c91e3d043d6dc31ab9bc1beee84df8bfefdc5b9c8e4b39c3ee9af335244e0801cc139debbe6de9ce6e6ff3e07f4a2cca2540dbb5ef541baad67f9b4ef3dede3548cf15534c29e047ffac5bc4fba29350ebed8b4f225c0117f92c7c1c2df902ffd2ee973d9189c8726a69c560a4d000d2a3fd0fd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:7e:fa:d3:11:f7:fa:b8:41:35:c0:be:87:0e:93:08:45:f0:27:5b] modulus: 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 public exponent: 10001 ] 2022-04-08 09:35:08.550 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:35:08.554 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:35:08.556 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 09:35:08.557 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:35:08.558 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-08 09:35:08.559 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:35:08.559 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:35:08.560 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:35:08.560 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:35:08.561 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:35:08.568 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:35:08.569 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:35:08.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:35:08.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:35:08.835 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:35:08.836 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:35:08.836 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:35:08.836 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:35:08.838 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:35:08.838 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:35:08.838 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:35:08.839 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:35:08.839 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:35:08.839 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:35:08.840 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:35:08.840 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:35:08.841 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:35:08.841 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:35:08.841 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:35:08.842 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:35:08.847 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:63:42:4b:79:4c:12:c1:5e:37:ee:da:b5:28:f1:85:f0:36:f1:08] modulus: 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 public exponent: 10001 ] 2022-04-08 09:35:26.211 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-08 09:35:26.213 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-08 09:35:26.214 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-08 09:35:26.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-08 09:35:26.215 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-08 09:35:26.215 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-08 09:35:26.216 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-08 09:35:26.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-08 09:35:26.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-08 09:35:26.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-08 09:35:26.222 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-08 09:35:26.223 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:35:26.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-08 09:35:26.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:35:26.442 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-08 09:35:26.443 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-08 09:35:26.443 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-08 09:35:26.444 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-08 09:35:26.446 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-08 09:35:26.446 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-08 09:35:26.447 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:35:26.447 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:35:26.447 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:35:26.448 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:35:26.448 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:35:26.448 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:35:26.449 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-08 09:35:26.449 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-08 09:35:26.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-08 09:35:26.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-08 09:35:26.454 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 127617624679070807038344760469729494163786569304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 08 05:11:02 UTC 2022 Final Date: Wed Apr 07 05:11:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:2a:8a:3c:e1:04:12:80:9e:ee:fa:bc:92:33:f9:a4:73:52:92:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 74a972717844b0f73f3872586b35d93e5bce0a3d 232fc3ae3fafe5ea367239244d2adc9415df5de4 67db9a96b5c17b5c452b8416b5c46576b41256a1 0c8da9f37d274844d53bf905c258b7a7409f7ac5 f28a81fbf20cdb3f71d11656a063114bb9b641c8 c117e303b2b0c33a5123c3e2468fc7f286c61456 5b2a1c58e7d94ebe94cdb7724b4f69b338f87268 9de8bddb77f3c194e260ce34ed487d32772f145d 6e4512d81b9d0a3d46b934f4d151bdcfdfe0f5e6 3fc58a99b079410f07dc3866f3b25bcf9297f9b8 f6d61ad411b0746b70e5058530ba06075d785e3a 39f48d04d2f9a2b5605a31c82dbe5d5f167f4aa9 a03169ca35c37b54bc1da2178e3677aeaeba27d8 71f15032160f9c9bcae60827e6fa5f395435e6ba 5739b683c6b6a1abb7ddd20d53ddba3ea54ff952 ea99deb5748485e973dd3276e0ed23825059b097 5475b596e6bcb90da6d2cb528fef8bb87098c3c7 f441f159f5a6eb37b69bcee9a5593cd9231982f6 e8d8e51b0c3eace94a22f4b46df8e411ef0c7ad2 9e436315 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:c6:f1:29:2b:3f:26:d8:ed:e6:02:50:1f:73:fc:db:a6:7d:95:68] modulus: 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 public exponent: 10001 ]