By type
2022-05-20 11:22:29,705 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-20 11:22:34,105 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-20 11:22:37.403 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 20, 2022 11:22:47 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 20, 2022 11:22:47 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 20, 2022 11:22:47 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 20, 2022 11:22:47 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-20 11:22:49.611 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-20 11:22:51.018 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-20 11:22:51.707 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-20 11:22:54.805 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-20 11:22:54.809 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-20 11:22:54.810 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-20 11:22:54.813 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-20 11:22:55.017 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-05-20 11:22:55.020 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-20 11:22:55.627 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-20 11:23:01.505 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 20, 2022 11:23:05 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-20 11:23:06.509 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 40.891 seconds (JVM running for 49.24) May 20, 2022 11:23:12 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-20 11:29:19.411 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 11:29:19.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 11:29:19.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-20 11:29:19.617 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 11:29:19.711 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-20 11:29:19.802 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 11:29:19.803 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 11:29:19.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 11:29:19.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 11:29:19.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 11:29:19.816 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 11:29:19.820 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 11:29:20.105 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 11:29:20.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 11:29:20.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 11:29:20.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 11:29:26.204 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 11:29:26.207 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 11:29:26.207 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 11:29:26.208 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 11:29:26.215 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 11:29:26.216 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 11:29:26.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 11:29:26.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 11:29:26.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 11:29:26.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 11:29:26.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 11:29:26.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 11:29:26.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 11:29:26.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 11:29:26.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 11:29:26.317 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 11:29:26.423 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:63:bf:9e:4c:4b:9e:ea:30:6c:a2:54:4f:42:9e:6d:1c:63:7b:7a] modulus: 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 public exponent: 10001 ] 2022-05-20 13:58:42.567 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 13:58:42.569 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 13:58:42.571 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 13:58:42.572 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 13:58:42.573 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 13:58:42.573 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 13:58:42.574 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 13:58:42.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 13:58:42.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 13:58:42.575 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 13:58:42.587 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 13:58:42.587 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 13:58:42.588 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 13:58:42.588 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 13:58:42.802 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 13:58:42.803 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 13:58:42.803 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 13:58:42.804 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 13:58:42.808 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 13:58:42.809 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 13:58:42.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 13:58:42.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 13:58:42.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 13:58:42.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 13:58:42.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 13:58:42.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 13:58:42.814 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 13:58:42.815 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 13:58:42.815 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 13:58:42.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 13:58:42.910 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:1a:6b:0a:9a:24:ca:92:24:6e:de:60:68:d9:59:9a:38:83:43:cd] modulus: b3f3c372d3729a507e2170b9c45c32ff6561c43af4ceafa92e4a4a8388d9114d0306d3bf28cb87c07e542b55f4208204f1a31774dfafa19954faf5255d4bbb952be5a7e445000c7aab1aed6330385aae71489c1fc5da2b694efeba3395cb3a1b1bd4e97596d352595bdccf4c37ad59c111203396a48592befd2fc7c90e43b992f38498c3dd7adf5356892df63d934b66f3580a64195c89827a0b288bcd3c4a1db48ab61f7a670c00f70bef332d6e5ef245e614288031ab500a21b7b74e18951fbc175b46182ca18112c51e6384fd1a0f98fa8bfcddcb86b2b5f4fa3e9f2e92fa79b849c4f990f19d6bf5a282a2c8d1b6b048bae405cb90fd1ded4c356c439865 public exponent: 10001 ] 2022-05-20 14:03:18.288 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:03:18.290 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:03:18.292 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:03:18.293 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:03:18.293 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:03:18.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:03:18.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:03:18.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:03:18.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:03:18.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:03:18.305 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:03:18.305 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:03:18.306 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:03:18.306 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:03:18.413 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:03:18.414 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:03:18.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:03:18.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:03:18.416 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:03:18.417 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:03:18.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:03:18.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:03:18.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:03:18.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:03:18.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:03:18.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:03:18.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:03:18.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:03:18.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:03:18.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:03:18.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a8:87:67:49:3d:a9:15:a5:75:9c:4a:6a:70:e4:36:14:d5:3a:f7:87] modulus: cbbac02ed847fd8d5efaa3f342165a75d3cee353a59d539e68eeae6a4842d6707077bfac65cad63fb5d73ff4cd18c29c8759e8627ca50b0f7537a636da969f4ee860b560cdeae5c7ded07fcf24d7a7824a39a30723650c8c9d8301534690c5c6508c41e6dd2279e9dca0d5cdb867a2a28eebaddcad8f63d5bb233f5c99ae4e5e231311c04ea2c7ea44d611e24631ae6a04cf52c10c68085b5733fc29fb4d04bd03ef65815039b9bcbde754a5daa6dcbf3c38c995924459903c92175fc5d5c59b430ebfec297dfcf3876487cd21947942dab02af57192835238896b06ff890cadf9cf6ef43144a064018e08f26d679f0dd3ecc1b5ec1f77227656fd778ca2f173 public exponent: 10001 ] 2022-05-20 14:05:57.924 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:05:57.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:05:57.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-20 14:05:57.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:05:57.928 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-20 14:05:57.929 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:05:57.929 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:05:57.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:05:57.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:05:57.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:05:57.937 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:05:57.938 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:05:57.938 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:05:57.938 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:05:58.112 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:05:58.113 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:05:58.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:05:58.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:05:58.115 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:05:58.115 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:05:58.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:05:58.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:05:58.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:05:58.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:05:58.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:05:58.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:05:58.119 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:05:58.119 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:05:58.119 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:05:58.120 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:05:58.123 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:69:a0:4e:d8:c5:6f:a1:5c:36:13:5f:9c:23:84:6e:c3:dd:16:b0] modulus: b574dc5e235f03164094fe1727182216e7fef6be851a6a37a1297acf445729da9dfabb128bed3c3987d53d10d3768776001c6f2c745f8a921a0076262769b5b622b3bcbc483cc79c8c1370dc56e9b20e1202a5282b0472fb8c84d56231f8331d12dc567710eee8431a2a00b0d700394d760c50a837852636305118413d864545693efb42d0129156d030352abaa26963caa5a75c25b90443e9926593382440fb7dc63213109ca06ecc03e1861a7e562ce54badc0868654392d01bf124534df68522aa0e0dbf1e1f3e7e5fa55242cb88558aa4e2657d72c1075d437a9160b140b36ce9600c0b054acc322df3902d65e719267b2e76d732e63a316811cd622791d public exponent: 10001 ] 2022-05-20 14:08:17.347 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:08:17.349 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:08:17.351 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:08:17.352 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:08:17.352 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:08:17.353 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:08:17.354 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:08:17.354 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:08:17.355 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:08:17.355 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:08:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:08:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:08:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:08:17.361 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:08:17.478 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:08:17.479 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:08:17.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:08:17.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:08:17.502 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:08:17.503 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:08:17.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:08:17.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:08:17.505 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:08:17.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:08:17.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:08:17.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:08:17.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:08:17.508 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:08:17.508 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:08:17.509 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:08:17.514 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:00:a2:4a:cc:1c:87:8c:59:25:a7:42:fa:3c:fc:98:0a:c1:a8:0f] modulus: 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 public exponent: 10001 ] 2022-05-20 14:12:43.308 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:12:43.309 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:12:43.316 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:12:43.317 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:12:43.317 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:12:43.318 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:12:43.318 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:12:43.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:12:43.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:12:43.319 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:12:43.324 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:12:43.324 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:12:43.324 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:12:43.325 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:12:43.485 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:12:43.486 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:12:43.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:12:43.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:12:43.488 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:12:43.488 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:12:43.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:12:43.501 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:12:43.501 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:12:43.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:12:43.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:12:43.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:12:43.505 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:12:43.505 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:12:43.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:12:43.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:12:43.511 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:fb:f8:ab:87:d7:14:26:3c:bd:45:5d:9e:89:28:ae:29:d2:c9:cf] modulus: ca537aff7d8b7da50ce13d9c93d7d318e9c4242385e49a7ad522a6e9c0236e53884c1d59bc606b25df475bc7b1fc088891bf5c996608f8b173fbc88231b4a82e667aa36f822cb5877eaa223990335f879a40eed5280a63c3edb12696b2787e25e476843bdd2b93d09300c3665da8223cd9a1340fe35df093fc790e91e7a12746e8853041ba0d512e8bde6c8dc9e7a9c615dacdc94c775af3c54aaaa2c2bee77fa55543ea4607d2e1dfa84aa5ac74b2b29a681408e57463aab84fdbff75de778c72370e860060e43cbc9091a8562ab014684ba130d6675e4a544be045a10ee675f5366fbf708cacb10ec20024568dada309c9c4f04243ee5767e28f2a6959942b public exponent: 10001 ] 2022-05-20 14:17:37.785 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:17:37.786 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:17:37.788 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:17:37.788 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:17:37.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:17:37.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:17:37.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:17:37.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:17:37.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:17:37.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:17:37.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:17:37.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:17:37.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:17:37.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:17:37.896 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:17:37.896 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:17:37.897 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:17:37.897 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:17:37.899 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:17:37.899 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:17:37.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:17:37.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:17:37.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:17:37.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:17:37.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:17:37.901 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:17:37.901 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:17:37.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:17:37.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:17:37.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:17:37.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:10:2d:27:6f:7a:34:12:8c:7e:82:82:07:58:53:5e:93:08:7e:7e] modulus: e71fbe4f45b36fd218387524435aba97d82be532f0cd6948722ea9f8081307015baab2399c21d8ad66a05839855ea05e4e4ab60cf81531330fd7ea4f58491059a759de2511043776195ec2bd1668aec242ca093cfb1ddfc4fe6a50deb328224ac1d54ef2d9983f74dd53bf0a208f610059677066e926cf1fe6caaa6ffe0f07e101dd72a226169751e17b05020707a9605623d1cd4fdc305c239c40b637ed16ca6e391e0459a4a1599e132b5689bf930660ed7a91a304fa93773a9c129e56b661812ca033652749332e772ed1b1a82f1e25634b6027c7ea71e8198906097b67711ae9a37599f5c66ebb93be5dfbc9a2fd4d6844f6a311c4d6d035c9823116d059 public exponent: 10001 ] 2022-05-20 14:23:59.694 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:23:59.696 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:23:59.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-20 14:23:59.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:23:59.699 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-20 14:23:59.699 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:23:59.700 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:23:59.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:23:59.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:23:59.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:23:59.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:23:59.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:23:59.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:23:59.708 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:23:59.783 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:23:59.783 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:23:59.784 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:23:59.784 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:23:59.802 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:23:59.802 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:23:59.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:23:59.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:23:59.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:23:59.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:23:59.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:23:59.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:23:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:23:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:23:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:23:59.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:23:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:fd:06:46:61:90:9c:3f:eb:9f:a9:50:9f:bb:c1:fa:d4:43:92:86] modulus: bbc02348847efcf7dcf3ae60fafbb7dfccb1564e3631c88221c10f6a3348c35f51fed51d0382e26f68584f7ae3a78db580da87e7147dbce88f86a538a090077be5d057b7fbfdc23978eb9fd59ecb95912b8e728af55f2bc9f46ecd072dcf13325f932480bbe0e7520ef951bf1afe12716ff8a1d2637b1da06054521fa851c580ccdd1fce7f295a487d1ec3c10dd80732ba927162e1941f4fe53677e1cba5735e6f5ab67e78d2e803e856ad28dc70eb89b45ef5ebe933b22eac244afbab619030047d809e89e5c8dd18f1e49e4429a181d7298d83555624640b77fe5574c3cd4747cb7c6cbb839bb86996d44815ca500b8d0059f2cde17a1c990a148d2836791b public exponent: 10001 ] 2022-05-20 14:24:56.624 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:24:56.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:24:56.626 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-20 14:24:56.626 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:24:56.626 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-20 14:24:56.627 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:24:56.627 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:24:56.627 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:24:56.628 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:24:56.628 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:24:56.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:24:56.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:24:56.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:24:56.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:24:56.728 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:24:56.729 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:24:56.729 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:24:56.730 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:24:56.731 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:24:56.732 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:24:56.732 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:24:56.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:24:56.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:24:56.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:24:56.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:24:56.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:24:56.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:24:56.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:24:56.735 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:24:56.735 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:24:56.804 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:b0:8c:e9:2d:c4:32:0f:a8:1d:2b:4b:7f:62:3b:d3:9d:6a:d8:c5] modulus: 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 public exponent: 10001 ] 2022-05-20 14:28:55.658 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:28:55.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:28:55.662 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:28:55.663 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:28:55.663 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:28:55.664 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:28:55.664 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:28:55.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:28:55.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:28:55.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:28:55.669 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:28:55.669 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:28:55.669 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:28:55.670 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:28:55.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:28:55.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:28:55.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:28:55.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:28:55.766 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:28:55.766 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:28:55.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:28:55.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:28:55.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:28:55.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:28:55.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:28:55.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:28:55.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:28:55.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:28:55.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:28:55.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:28:55.773 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:aa:28:a2:f9:c7:d0:a8:98:df:95:14:04:b3:90:88:7a:52:35:36] modulus: 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 public exponent: 10001 ] 2022-05-20 14:36:06.529 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:36:06.530 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:36:06.532 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-20 14:36:06.532 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:36:06.533 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-20 14:36:06.533 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:36:06.533 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:36:06.533 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:36:06.534 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:36:06.534 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:36:06.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:36:06.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:36:06.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:36:06.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:36:06.627 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:36:06.628 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:36:06.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:36:06.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:36:06.631 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:36:06.632 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:36:06.632 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:36:06.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:36:06.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:36:06.634 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:36:06.635 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:36:06.635 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:36:06.636 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:36:06.636 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:36:06.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:36:06.638 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:36:06.642 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:64:af:f3:17:0f:bf:03:73:14:5a:d8:c4:a5:76:b7:47:22:10:8e] modulus: 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 public exponent: 10001 ] 2022-05-20 14:36:30.864 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:36:30.865 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:36:30.866 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:36:30.866 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:36:30.867 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:36:30.867 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:36:30.867 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:36:30.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:36:30.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:36:30.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:36:30.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:36:30.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:36:30.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:36:30.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:36:31.002 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:36:31.002 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:36:31.003 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:36:31.003 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:36:31.005 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:36:31.005 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:36:31.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:36:31.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:36:31.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:36:31.007 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:36:31.007 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:36:31.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:36:31.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:36:31.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:36:31.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:36:31.010 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:36:31.013 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:82:6d:62:31:72:75:d8:a8:b1:e7:0c:db:9f:a2:95:bc:cb:37:df] modulus: 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 public exponent: 10001 ] 2022-05-20 14:38:21.684 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:38:21.685 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:38:21.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-20 14:38:21.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:38:21.686 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-20 14:38:21.687 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:38:21.687 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:38:21.687 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:38:21.687 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:38:21.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:38:21.693 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:38:21.693 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:38:21.694 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:38:21.694 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:38:21.794 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:38:21.795 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:38:21.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:38:21.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:38:21.798 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:38:21.798 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:38:21.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:38:21.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:38:21.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:38:21.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:38:21.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:38:21.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:38:21.801 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:38:21.802 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:38:21.802 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:38:21.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:38:21.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:1e:51:16:2c:25:7c:2b:c6:0a:63:c5:d4:ba:60:59:89:29:be:3e] modulus: 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 public exponent: 10001 ] 2022-05-20 14:47:28.088 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:47:28.089 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:47:28.091 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:47:28.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:47:28.092 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:47:28.093 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:47:28.093 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:47:28.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:47:28.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:47:28.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:47:28.101 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:47:28.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:47:28.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:47:28.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:47:28.199 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:47:28.200 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:47:28.200 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:47:28.200 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:47:28.202 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:47:28.202 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:47:28.202 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:47:28.203 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:47:28.203 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:47:28.203 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:47:28.204 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:47:28.204 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:47:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:47:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:47:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:47:28.206 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:47:28.209 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:1a:eb:fd:56:83:af:62:54:ac:d0:78:3b:3f:9b:3e:80:e2:f3:bd] modulus: c6e42286ed698f2d33b4ada6834ae094ce789b5f693d7a0f3715cdbc64537dd1d182e2b0b5d59014c393caa2a455c973fa06b1a3630fec6063d002d1b2ae86721c8a53cf5a49dd2b0bd73842ddb9df08582a639770c070925e9a71f94e6c89e5a4a06203f4868217d080ee55d3694e16a2c6a7ede8f51be8019f179f5b7f45db39a6999b5ba57f060b14e4cc1c81049a70027262adc8bdf3dfce61d55abe9ccabcd614c5fa106708abe8ab9ca21d4e0fb99cf5a5b3fbb6899b140a94373797dbb09ab1b143d72d576ab0dce808752ff7c2d2f4faf7976683ea69f9054deaf82217c7a51b532c1425ab0c1e83ecb25739817ec8c255d2beb8648b0698c238aced public exponent: 10001 ] 2022-05-20 14:57:29.834 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 14:57:29.836 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 14:57:29.837 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:57:29.838 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 14:57:29.838 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 14:57:29.839 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 14:57:29.839 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 14:57:29.839 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 14:57:29.840 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 14:57:29.840 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 14:57:29.845 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 14:57:29.846 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:57:29.846 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 14:57:29.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:57:29.937 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 14:57:29.937 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 14:57:29.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 14:57:29.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 14:57:29.939 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 14:57:29.939 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 14:57:29.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:57:29.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:57:29.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:57:29.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:57:29.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:57:29.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:57:29.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 14:57:29.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 14:57:29.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 14:57:29.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 14:57:29.946 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 228715046496754800539246530448326389900488848053 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 11:16:36 UTC 2022 Final Date: Wed May 19 11:16:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f 1f6bde3360d319b23437d8762ff74c9e43d3aa8a c1d7f467f4af2abe07af96f94923709e0520d751 f1a7b37edf9f003308c4dcfcf23897abde34cc61 daa8cb660128c0b5d2480c74ebe8cd585cc52bb5 74db062753e45248c74a64fe890659bd3c02b48b 4a6be0cca554458db7fe24230e4ecfa093c0aa3b 22c00dde0b66db045e7f2cc0e281c652451156c1 048215ef6f6fee3e47b612514c5a75fd8d8470fa ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e 556c5139166d5882ffb33a0bcbfff812cf44d79e 78684a3582870f48baff9687ccead5f175c1f72f 96a41bb2f6281eab34f14bdb435b8b9ac6e28658 313365d2cb65996ead7f767d207d7c664da77abf e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf 1acf48148a803fbbc17c2dd27aed5dd1d73f5c81 dbdcc7da3b801e886cf8e1f6a486be8f8033af49 7e4895130ac7b07a94816620ba014a5c314c291c f6ae5ee1225d90fb61016195c3f7aa895d1bb751 6444a3a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:d0:0d:ee:7f:e0:ce:86:21:38:8d:7a:e2:76:a9:a4:5e:96:be:c3] modulus: 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 public exponent: 10001 ]