By type
2022-06-30 05:19:51,933 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-30 05:19:52,804 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-30 05:19:53.578 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 30, 2022 5:19:55 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 30, 2022 5:19:55 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 30, 2022 5:19:55 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 30, 2022 5:19:55 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-30 05:19:56.068 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-30 05:19:56.375 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-30 05:19:56.524 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-30 05:19:57.282 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-30 05:19:57.285 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-30 05:19:57.287 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-30 05:19:57.290 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-30 05:19:57.334 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-30 05:19:57.337 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-30 05:19:57.481 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-30 05:19:58.152 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 30, 2022 5:19:58 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-30 05:19:59.049 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.01 seconds (JVM running for 9.785) Jun 30, 2022 5:20:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-30 05:20:32.468 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 05:20:32.477 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 05:20:32.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-30 05:20:32.526 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 05:20:32.553 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-30 05:20:32.556 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 05:20:32.558 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 05:20:32.559 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 05:20:32.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 05:20:32.565 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 05:20:32.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 05:20:32.578 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 05:20:32.621 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 05:20:32.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 05:20:32.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 05:20:32.634 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 05:20:33.210 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 05:20:33.212 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 05:20:33.213 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 05:20:33.214 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 05:20:33.224 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 05:20:33.225 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 05:20:33.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 05:20:33.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 05:20:33.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 05:20:33.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 05:20:33.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 05:20:33.242 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 05:20:33.249 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 05:20:33.249 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 05:20:33.250 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 05:20:33.252 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 05:20:33.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:24:42:e8:26:52:a8:b6:4b:29:ba:f3:ab:1a:e3:af:f7:c7:c0:db] modulus: d939b13959fff56208865137a844973a84e26ed5f7108ab49bd569f269c7ee0b5762d3c61179156e9f1f9d124a7c709b96b00d183ad649827d45a8b50cd2e921c22761f1b8c4672cdf1cc178d35794667f6f52cfcd3487cec7fad9fbd401651f644b980d3802e1c7b0a4786e1464649e79cbc0f50581f50de2d41956186ec4b9882d6bd2c8a379e2bec0f3b9ac7d7c94c7913da8c66580eb05f2dcc85c2603a8ebdfc169583b49ac945065baf96311205a6f89dfd5bd456ab498260ef47453c3f7cae217195ebebb66b6443b28082f460c68a92597eb20922f70d3810874f3ca5b77f14a58a0542ffdbf4d396b96bef0a7e59cb92a167f0e171b48b51b7c79c5 public exponent: 10001 ] 2022-06-30 06:44:49.539 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 06:44:49.543 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 06:44:49.547 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:44:49.548 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 06:44:49.549 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:44:49.550 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 06:44:49.551 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 06:44:49.551 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 06:44:49.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 06:44:49.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 06:44:49.565 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 06:44:49.567 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:44:49.567 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:44:49.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:44:49.784 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 06:44:49.786 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 06:44:49.787 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 06:44:49.787 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:44:49.792 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 06:44:49.793 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 06:44:49.794 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:44:49.794 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:44:49.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:44:49.797 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:44:49.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:44:49.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:44:49.799 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:44:49.800 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:44:49.801 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:44:49.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 06:44:49.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:39:e8:23:b7:65:3e:55:6e:9f:7a:c5:af:76:63:f2:9b:ee:15:47] modulus: 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 public exponent: 10001 ] 2022-06-30 06:46:37.763 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 06:46:37.771 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 06:46:37.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-30 06:46:37.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 06:46:37.781 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-30 06:46:37.782 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 06:46:37.783 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 06:46:37.784 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 06:46:37.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 06:46:37.786 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 06:46:37.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 06:46:37.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:46:37.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:46:37.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:46:37.974 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 06:46:37.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 06:46:37.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 06:46:37.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:46:37.982 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 06:46:37.982 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 06:46:37.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:46:37.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:46:37.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:46:37.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:46:37.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:46:37.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:46:37.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:46:37.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:46:37.990 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:46:37.991 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 06:46:37.998 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:1b:d2:b6:42:ea:82:fd:7a:d1:8b:20:00:98:3a:9d:c6:29:2b:ee] modulus: e9e22e676b10fbfcb5506a58368578225976c5d40b3eef5498bb8fa05d6c1e4d5521ebeec25baae1cfdc1954d40f1076590a4052880298eea94693ab5b9488cd11e49e0afb29c34229dbd29bbd39ef3df1f057954f93096af439dff67dffddbbae2b5aa8081732a7e33750f730d8adf460cf5dce8f1825a497ebca862429f07ef5d83696001bd0e47b4ef9d74232756887640e50ec4331c5e5872443ce0831724dc9460d31d00e5ae860b073d977517348b1690f91b3ab73cdc5b27be4b5c15d717113a4d3f84339df1a0be736897adb01f550126ad496cbecd27f8bf680eb8179340f4ab184df600578ebfba213c34ed0ba9f24dae66af0b1a004bfe1176f47 public exponent: 10001 ] 2022-06-30 06:48:15.373 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 06:48:15.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 06:48:15.376 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-30 06:48:15.377 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 06:48:15.377 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-30 06:48:15.378 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 06:48:15.379 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 06:48:15.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 06:48:15.380 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 06:48:15.381 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 06:48:15.386 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 06:48:15.387 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:48:15.388 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:48:15.388 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:48:15.520 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 06:48:15.521 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 06:48:15.522 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 06:48:15.522 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:48:15.525 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 06:48:15.525 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 06:48:15.526 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:48:15.527 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:48:15.527 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:48:15.528 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:48:15.528 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:48:15.529 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:48:15.530 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:48:15.530 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:48:15.531 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:48:15.532 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 06:48:15.538 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:9c:d7:32:fe:1d:25:e3:0b:9e:30:b6:28:00:03:a0:7c:45:75:49] modulus: b7e67d71e55c0861a09e83f6b7916fff89a028d624299115b570b1158bf970c99445470be9029b2b1a02cf2a1b38b21c2684272a11614e4a431ae66b71c6d60680bdede7da7ebbed6a2724ce99357e5c25dee5ec845f4675ac1743b6e323945c4a153131f1bcf0ee6afb8b1279f8e9bc3ea9a4b6022398542550e0988f480241dd79fbb38c0e385694ad22d9298e33d9eb21f1da9305d250fbc6cbaacc155230755108a0669b1c561788bbc955b1aa5e63cd25f4ad224c86d3441f3f855376f72827d9448f95fe7d2594f3f82ca26bf913277a7bbee9f73bf65b39536d8048531b27752d4ba96702ead11f01718b0a97d0d1e8f83f04357cae06b2973d05a1cf public exponent: 10001 ] 2022-06-30 06:50:55.257 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 06:50:55.259 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 06:50:55.260 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:50:55.261 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 06:50:55.262 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:50:55.262 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 06:50:55.263 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 06:50:55.263 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 06:50:55.264 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 06:50:55.264 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 06:50:55.272 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 06:50:55.273 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:50:55.273 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:50:55.274 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:50:55.440 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 06:50:55.441 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 06:50:55.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 06:50:55.442 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:50:55.443 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 06:50:55.444 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 06:50:55.444 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:50:55.445 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:50:55.445 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:50:55.446 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:50:55.446 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:50:55.446 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:50:55.447 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:50:55.448 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:50:55.448 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:50:55.449 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 06:50:55.453 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:0e:c4:57:4b:b9:5b:20:22:dc:97:11:8a:cb:1f:ef:2a:e5:33:65] modulus: c0037fc32f3ea1a502162d5dcc2bdeb044db4d45ae31b174a36c2c97e1c237f82caf31be234631ccacc8eb2f0a3243a5fdadb48357c18c173c7d4e919aa94fbfcdbe5c451e050151b7a201033349f2f8a9445a45f3d55977c0d21943d439bd6aba7f32298803cf8b15cb3c99e92ad78eef32fec05aff091402892cd073a8c4045a6e02062a011ae9075afbb35298804d0d3342f316d34bc28571f817eb4cd0d4abd7201acc2cc132a11123afef4c3a23fa6499c38b969667f151f35dc57d64fafcd396d67cc6bd43d39c45d3b8a84eee12ede8b7157afd63a05786095fdbc141848bfa9fe2ba11c21ac4131770bee695ed18649cc93e18455b7ae711f05cc63f public exponent: 10001 ] 2022-06-30 06:54:08.527 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 06:54:08.528 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 06:54:08.529 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:54:08.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 06:54:08.531 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:54:08.531 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 06:54:08.532 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 06:54:08.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 06:54:08.533 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 06:54:08.533 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 06:54:08.539 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 06:54:08.539 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:54:08.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:54:08.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:54:08.694 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 06:54:08.695 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 06:54:08.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 06:54:08.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:54:08.697 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 06:54:08.697 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 06:54:08.698 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:54:08.698 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:54:08.698 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:54:08.699 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:54:08.699 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:54:08.699 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:54:08.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:54:08.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:54:08.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:54:08.701 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 06:54:08.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:d7:8d:3b:e9:ec:f9:97:2d:70:2e:b6:5e:35:f8:36:3d:35:65:3c] modulus: 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 public exponent: 10001 ] 2022-06-30 06:59:36.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 06:59:36.708 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 06:59:36.711 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:59:36.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 06:59:36.713 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 06:59:36.714 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 06:59:36.715 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 06:59:36.715 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 06:59:36.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 06:59:36.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 06:59:36.723 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 06:59:36.725 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:59:36.725 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 06:59:36.725 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:59:36.936 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 06:59:36.937 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 06:59:36.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 06:59:36.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 06:59:36.938 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 06:59:36.939 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 06:59:36.939 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:59:36.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:59:36.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:59:36.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:59:36.941 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:59:36.941 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:59:36.942 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 06:59:36.942 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 06:59:36.942 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 06:59:36.943 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 06:59:36.947 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:ad:97:ef:63:27:d7:06:63:33:62:7e:db:4e:fd:43:c9:cc:74:fb] modulus: e470d03d53246a5237235adeb6193c41d4e5603496a246c3a1d4fa1f31f289e62e1331e0dd287345086fea30314ae7c5e8ac6766ca784130c4aeb7d28cd5596f84b5c27db453bd892ef32b3e8817c9335e7de0b82208ce743f94d1f246c1b46aadbcc04340fd8d3a312a76adbbd5d7ed3997a1480927bab45d3a9eb26f738e40e5f9b30425ff2160fc6044640fd15da7f0aa6fdb1db304d7958e7c86bb27f7bb7b12571924ef80c62bdcb0dc8afd4d6289d38451b0cabb0bbad5def8550d9fd7731b8f159bf5e19b6c9b0ac3a93dd63b02319f1f24549d1a656178a8f00213804f827bc71c64507918021f06a3ec9b37b9a0f9f6a20d281587879ce543d55653 public exponent: 10001 ] 2022-06-30 07:04:09.813 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 07:04:09.815 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 07:04:09.816 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 07:04:09.817 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 07:04:09.817 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 07:04:09.818 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 07:04:09.818 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 07:04:09.818 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 07:04:09.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 07:04:09.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 07:04:09.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 07:04:09.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:04:09.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:04:09.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:04:09.996 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 07:04:09.997 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 07:04:09.998 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 07:04:09.998 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:04:09.999 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 07:04:10.000 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 07:04:10.000 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:04:10.000 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:04:10.001 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:04:10.001 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:04:10.002 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:04:10.002 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:04:10.003 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:04:10.003 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:04:10.003 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:04:10.004 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 07:04:10.008 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:cb:8e:ad:85:47:71:d2:5a:51:f4:86:bf:b5:e1:b3:65:27:de:aa] modulus: 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 public exponent: 10001 ] 2022-06-30 07:04:13.092 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 07:04:13.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 07:04:13.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-30 07:04:13.096 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 07:04:13.096 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-30 07:04:13.096 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 07:04:13.097 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 07:04:13.097 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 07:04:13.097 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 07:04:13.098 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 07:04:13.102 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 07:04:13.103 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:04:13.103 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:04:13.103 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:04:13.198 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 07:04:13.198 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 07:04:13.199 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 07:04:13.199 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:04:13.200 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 07:04:13.200 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 07:04:13.201 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:04:13.201 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:04:13.201 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:04:13.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:04:13.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:04:13.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:04:13.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:04:13.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:04:13.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:04:13.205 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 07:04:13.209 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:7f:fb:b7:e8:ce:1a:81:6a:20:99:a3:dc:a5:89:9b:6a:51:ef:f1] modulus: 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 public exponent: 10001 ] 2022-06-30 07:08:33.757 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 07:08:33.762 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 07:08:33.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 07:08:33.768 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 07:08:33.769 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 07:08:33.769 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 07:08:33.770 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 07:08:33.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 07:08:33.771 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 07:08:33.771 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 07:08:33.778 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 07:08:33.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:08:33.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:08:33.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:08:34.033 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 07:08:34.034 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 07:08:34.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 07:08:34.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:08:34.036 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 07:08:34.037 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 07:08:34.037 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:08:34.037 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:08:34.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:08:34.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:08:34.039 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:08:34.039 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:08:34.039 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:08:34.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:08:34.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:08:34.041 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 07:08:34.046 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:a5:eb:fa:1f:2c:d7:d1:c2:e8:50:4c:87:62:24:58:49:8f:23:c0] modulus: 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 public exponent: 10001 ] 2022-06-30 07:09:01.268 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 07:09:01.269 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 07:09:01.270 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-30 07:09:01.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 07:09:01.271 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-30 07:09:01.272 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 07:09:01.272 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 07:09:01.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 07:09:01.273 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 07:09:01.273 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 07:09:01.278 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 07:09:01.279 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:09:01.279 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:09:01.280 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:09:01.433 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 07:09:01.433 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 07:09:01.434 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 07:09:01.434 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:09:01.435 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 07:09:01.436 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 07:09:01.436 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:09:01.436 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:09:01.437 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:09:01.437 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:09:01.438 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:09:01.438 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:09:01.438 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:09:01.439 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:09:01.439 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:09:01.440 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 07:09:01.443 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:e2:76:e6:72:9a:0e:e2:16:0e:09:60:c1:5a:e9:ca:e4:81:99:c3] modulus: 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 public exponent: 10001 ] 2022-06-30 07:09:18.666 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 07:09:18.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 07:09:18.667 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-30 07:09:18.668 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 07:09:18.668 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-30 07:09:18.669 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 07:09:18.669 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 07:09:18.669 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 07:09:18.670 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 07:09:18.670 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 07:09:18.675 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 07:09:18.675 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:09:18.675 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:09:18.676 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:09:18.800 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 07:09:18.801 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 07:09:18.802 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 07:09:18.802 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:09:18.804 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 07:09:18.804 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 07:09:18.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:09:18.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:09:18.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:09:18.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:09:18.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:09:18.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:09:18.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:09:18.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:09:18.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:09:18.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 07:09:18.813 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 9f806fd9e5e01b910bab1a4d57e7a3993e2378cbc0b24123851633b329aefd63b442679d0ade2ec968e5373fd23305d40487fab010009c90ea3fed23aeba9259dd74d97d4250ae7b5240dc458071d9e12d4a95bdd82fecd312a181758c1e80da7e80fc9f2091b07e507db263aaa995c480186305aab45e1357a4c75ac6ff54aa8d5321e410bcb63f056e748bb2f3ec305938cc5ed684e0acf02a5847f77e1291a0a47fab1265eb991b961e0f440bdd5cd201595d773e43c25b99b2d980786cea226a10536c7399801132192e6c3c0e39618fae775cc2de795a8a1f8c1bb903acd281afd3b912991ddfaa1fed9a9d617f47cc8e0f16b91c1559d7ea408e0ee68d8f872b04965abc8adc945b443f4e78ab8cf3c4b752fa47d2894493c7517eb76c1d037a8738f0e07ddf64e083f509081d66313c439df2105211233d486a4b717e0041129a0d440d77e89a73d7518297bdffa5a3f48a70dd13371171a4a2f0792ebebd2913774da7c1989222d0ab6616776f291b72d2fd69e993fd783fe9454a89 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:9d:85:4b:ef:cd:81:50:9f:f1:a0:16:fd:97:71:cc:da:e7:f9:d3] modulus: b3079c7c829cdca43bff04047ab063e177ee1cd2129d49ee849fbc70f4ed95802742c5f59b85e1db3bbe59cf83271a70c644ff1938d98786ea7077e8c51a41c0c126b1b06435f515f9dd0eb421ce650e7329d53c2d4db235960f9d4c476d6e4962d15aa54dfba0a2bc3fcbb301625d065a1b3410daa7927b91bb2d2e9b0868d99a20e7231c4ebfb08b6e8ee45dea7427a20de85888a272a44ac1640fa9d822e7e316294f5ae5d92ebf0afa939a2efe708dcd88daa571a20f4bd97b5dfd097f9cd24fa1f34c9c04ee43a0451db84c2cde8262e246288a541720ef4e0f9d5cb2a220fd4e8a5d5c60758b9e673477d0106468dd18afe08268ed89a2198d8b846941 public exponent: 10001 ] 2022-06-30 07:13:27.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-30 07:13:27.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-30 07:13:27.297 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 07:13:27.297 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-30 07:13:27.298 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-30 07:13:27.298 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-30 07:13:27.299 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-30 07:13:27.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-30 07:13:27.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-30 07:13:27.300 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-30 07:13:27.307 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-30 07:13:27.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:13:27.309 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-30 07:13:27.309 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:13:27.446 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-30 07:13:27.447 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-30 07:13:27.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-30 07:13:27.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-30 07:13:27.451 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-30 07:13:27.454 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-30 07:13:27.454 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:13:27.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:13:27.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:13:27.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:13:27.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:13:27.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:13:27.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-30 07:13:27.458 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-30 07:13:27.458 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-30 07:13:27.466 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-30 07:13:27.471 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 704700885535849620579884071451002749379573090897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 30 05:17:07 UTC 2022 Final Date: Tue Jun 29 05:17:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8f:a4:da:a9:b7:e7:9c:ae:c2:0b:c1:d9:9d:78:ce:25:65:c2:a5:09] modulus: 9f806fd9e5e01b910bab1a4d57e7a3993e2378cbc0b24123851633b329aefd63b442679d0ade2ec968e5373fd23305d40487fab010009c90ea3fed23aeba9259dd74d97d4250ae7b5240dc458071d9e12d4a95bdd82fecd312a181758c1e80da7e80fc9f2091b07e507db263aaa995c480186305aab45e1357a4c75ac6ff54aa8d5321e410bcb63f056e748bb2f3ec305938cc5ed684e0acf02a5847f77e1291a0a47fab1265eb991b961e0f440bdd5cd201595d773e43c25b99b2d980786cea226a10536c7399801132192e6c3c0e39618fae775cc2de795a8a1f8c1bb903acd281afd3b912991ddfaa1fed9a9d617f47cc8e0f16b91c1559d7ea408e0ee68d8f872b04965abc8adc945b443f4e78ab8cf3c4b752fa47d2894493c7517eb76c1d037a8738f0e07ddf64e083f509081d66313c439df2105211233d486a4b717e0041129a0d440d77e89a73d7518297bdffa5a3f48a70dd13371171a4a2f0792ebebd2913774da7c1989222d0ab6616776f291b72d2fd69e993fd783fe9454a89 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 993d430943c6f3987871f5e14448b554ee2d3137 fd56403e99738053205604cd658cb8e1a79bdb0e 1cad70120b2610bed67bac1cec8a2806bd9b5d14 cdf351ead622ed75037f6d35d7c17f8ce241914a db59349cf349f0ddccd9ed86a27783b88967be87 7fe6b9b272c12d83c9f31e18c1073c9b02b5fb09 3762f5208980d970581103a45a4c94d993e93ec9 c8817529b9141259dd18b8f8fd990b040b3722d1 c84b081588245a2aec0ef8dde3eae5f386b0405f 6b7595b113e4bd1659bdb907e0de089102a149d1 20a61ed5473f5c0cdf11fa88051a650326d917a2 abf34f621d60ac795af7b90ea603a16d70a85774 6d6f089d6a25bf55c77333c38297d27fe586c273 fed81e38bd92d14c478156df0fb13116517dbbbd 35d5376923ae6b6a642f497a6a60400bbf82d349 0b024711f416f8cd299ae214061a699b60dde62d da3188e3daf6d6ebef04ff3a5f4a9333f7d4decc 969f0bc069a13abd7fa2cc678e7ec2491ddc2a8d 2f4f42b34799bee8f2ddbff5c0698febab1a12c2 9e8da6f0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:c4:7d:d0:8e:b2:51:66:74:ba:5b:a7:d2:c1:11:d1:6e:3d:46:25] modulus: cae7c9df1438ebc23b3f8e92e5fe65d85103d42f2a5a1393faad2f4ac90c8cb2212cca0162ad1d97a2a3482a81028c0dedeb38b6a6de4915940dae4c36d61da74a4fcc3ba9f918d359f228cb6b256d78f625deb783b50cf672d44b154f10eac8e62b05fe02e9e7e2344de21ded57b8a3c0c4595c3259676db0efc417df509b319faa0f1b1024f4908f72d36cccbfb41d6bd7f652733e37e5ea6ce523535735031e77e58164344598a4d0557af3c030d82c5fa549c2cf62b5d118762c00b4fda9d1e6bcf7c4b236a0675d7978941bbe6988fc4086dabc2160bc8b407fc9ccbe14672e035c43ac278fceea5b289c012469593ac682933130f87e339e8755457a63 public exponent: 10001 ]