By type
2022-11-06 02:56:26,855 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-06 02:56:27,840 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-06 02:56:28.629 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 06, 2022 2:56:30 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 06, 2022 2:56:30 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 06, 2022 2:56:30 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 06, 2022 2:56:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-06 02:56:31.187 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-06 02:56:31.471 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-06 02:56:31.633 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-06 02:56:32.329 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-06 02:56:32.332 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-06 02:56:32.334 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-06 02:56:32.337 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-06 02:56:32.377 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-06 02:56:32.380 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-06 02:56:32.523 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-06 02:56:33.098 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 06, 2022 2:56:33 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-06 02:56:33.986 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.89 seconds (JVM running for 9.803) Nov 06, 2022 2:57:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-06 02:57:24.794 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 02:57:24.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 02:57:24.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-06 02:57:24.851 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 02:57:24.868 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-06 02:57:24.871 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 02:57:24.873 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 02:57:24.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 02:57:24.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 02:57:24.881 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 02:57:24.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 02:57:24.895 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 02:57:24.942 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 02:57:24.947 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 02:57:24.948 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 02:57:24.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 02:57:27.095 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 02:57:27.102 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 02:57:27.104 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 02:57:27.106 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 02:57:27.119 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 02:57:27.120 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 02:57:27.121 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 02:57:27.122 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 02:57:27.122 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 02:57:27.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 02:57:27.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 02:57:27.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 02:57:27.140 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 02:57:27.140 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 02:57:27.141 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 02:57:27.142 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 02:57:27.169 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:a5:02:04:99:2c:b3:90:5f:30:da:ff:7b:e7:8b:c1:a9:9b:a2:ef] modulus: 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 public exponent: 10001 ] 2022-11-06 04:10:11.633 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:10:11.636 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:10:11.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:10:11.641 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:10:11.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:10:11.643 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:10:11.644 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:10:11.645 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:10:11.645 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:10:11.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:10:11.669 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:10:11.671 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:10:11.672 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:10:11.672 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:10:11.900 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:10:11.901 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:10:11.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:10:11.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:10:11.906 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:10:11.906 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:10:11.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:10:11.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:10:11.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:10:11.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:10:11.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:10:11.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:10:11.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:10:11.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:10:11.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:10:11.914 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:10:11.920 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:3e:23:f4:5c:31:fc:9e:12:dc:f9:e3:9d:be:52:3c:b8:92:a4:38] modulus: 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 public exponent: 10001 ] 2022-11-06 04:11:43.959 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:11:43.961 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:11:43.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-06 04:11:43.963 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:11:43.964 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-06 04:11:43.965 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:11:43.966 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:11:43.966 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:11:43.966 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:11:43.967 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:11:43.983 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:11:43.985 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:11:43.985 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:11:43.985 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:11:44.145 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:11:44.146 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:11:44.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:11:44.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:11:44.150 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:11:44.150 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:11:44.151 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:11:44.151 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:11:44.152 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:11:44.153 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:11:44.153 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:11:44.154 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:11:44.154 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:11:44.155 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:11:44.155 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:11:44.156 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:11:44.160 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:af:f6:08:59:43:dc:19:d0:f3:37:7e:8d:53:a3:e3:2d:d1:fc:90] modulus: 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 public exponent: 10001 ] 2022-11-06 04:13:05.357 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:13:05.359 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:13:05.361 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-06 04:13:05.361 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:13:05.362 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-06 04:13:05.363 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:13:05.363 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:13:05.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:13:05.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:13:05.365 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:13:05.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:13:05.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:13:05.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:13:05.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:13:05.504 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:13:05.505 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:13:05.505 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:13:05.505 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:13:05.508 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:13:05.508 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:13:05.509 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:13:05.509 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:13:05.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:13:05.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:13:05.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:13:05.512 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:13:05.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:13:05.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:13:05.514 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:13:05.515 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:13:05.518 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:c0:8d:8e:b1:ad:52:94:1c:da:9e:28:b8:b2:9f:a8:0e:f9:ac:e5] modulus: 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 public exponent: 10001 ] 2022-11-06 04:14:43.609 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:14:43.612 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:14:43.614 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:14:43.615 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:14:43.616 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:14:43.617 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:14:43.617 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:14:43.618 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:14:43.618 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:14:43.619 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:14:43.624 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:14:43.625 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:14:43.626 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:14:43.626 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:14:43.802 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:14:43.803 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:14:43.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:14:43.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:14:43.806 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:14:43.807 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:14:43.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:14:43.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:14:43.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:14:43.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:14:43.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:14:43.811 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:14:43.812 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:14:43.812 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:14:43.813 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:14:43.813 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:14:43.817 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:57:db:47:2b:d0:29:4f:e4:d5:0c:3a:d0:f1:73:2e:43:54:2e:a0] modulus: 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 public exponent: 10001 ] 2022-11-06 04:21:33.181 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:21:33.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:21:33.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:21:33.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:21:33.199 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:21:33.200 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:21:33.200 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:21:33.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:21:33.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:21:33.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:21:33.209 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:21:33.209 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:21:33.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:21:33.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:21:33.374 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:21:33.375 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:21:33.375 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:21:33.376 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:21:33.377 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:21:33.378 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:21:33.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:21:33.379 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:21:33.379 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:21:33.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:21:33.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:21:33.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:21:33.382 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:21:33.383 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:21:33.383 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:21:33.384 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:21:33.389 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:34:35:80:4c:d8:91:e9:e5:86:3c:cb:88:c7:d6:18:62:9d:a5:72] modulus: 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 public exponent: 10001 ] 2022-11-06 04:25:22.955 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:25:22.959 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:25:22.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:25:22.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:25:22.964 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 04:25:22.965 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:25:22.965 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:25:22.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:25:22.967 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:25:22.967 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:25:22.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:25:22.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:25:22.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:25:22.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:25:23.140 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:25:23.141 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:25:23.141 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:25:23.142 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:25:23.143 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:25:23.144 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:25:23.144 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:25:23.144 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:25:23.145 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:25:23.145 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:25:23.146 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:25:23.146 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:25:23.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:25:23.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:25:23.148 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:25:23.148 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:25:23.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:bc:aa:a6:a2:64:17:5e:ae:94:11:b6:29:28:5b:1f:ab:16:ce:15] modulus: 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 public exponent: 10001 ] 2022-11-06 04:31:55.011 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:31:55.012 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:31:55.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-06 04:31:55.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:31:55.015 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-06 04:31:55.015 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:31:55.016 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:31:55.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:31:55.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:31:55.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:31:55.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:31:55.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:31:55.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:31:55.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:31:55.174 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:31:55.175 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:31:55.175 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:31:55.175 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:31:55.177 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:31:55.177 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:31:55.177 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:31:55.177 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:31:55.178 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:31:55.178 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:31:55.178 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:31:55.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:31:55.179 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:31:55.180 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:31:55.180 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:31:55.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:31:55.187 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:ec:cd:36:46:47:ad:f3:0b:e4:bd:ae:36:f1:40:53:ad:ca:f0:af] modulus: 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 public exponent: 10001 ] 2022-11-06 04:36:23.028 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:36:23.031 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:36:23.034 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-06 04:36:23.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:36:23.035 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-06 04:36:23.036 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:36:23.036 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:36:23.037 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:36:23.037 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:36:23.037 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:36:23.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:36:23.044 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:36:23.044 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:36:23.044 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:36:23.212 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:36:23.213 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:36:23.213 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:36:23.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:36:23.215 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:36:23.216 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:36:23.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:36:23.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:36:23.217 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:36:23.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:36:23.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:36:23.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:36:23.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:36:23.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:36:23.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:36:23.220 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:36:23.225 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:f6:2b:a3:42:06:dd:a8:12:97:26:33:c7:9a:8f:ab:23:64:3f:cc] modulus: c6373068a5d0d28e7ca63d7de2fed385ba2dc937ade3c64a2988f952d5d47d129e281be622543ebd66cbe0e75cdf6f83b883dc1aab4f6535b1a41b873adc044598e521b8ad2c7503e23280a643f8e30be4991beeae3941705eb7ee2ef8ae50d32485bd68b869110842de45d53a03899074c6b8c2daca19a4d4cab05017e6672cdaf5fa53d4fe1cf6172337feb52552a0457a0b97d3cbe6c7827afd0e67b321e0b972e7990a68d59380b72c6b0ee9c61b872d0d7309a268b301d30ef0bd58b009279157520de996e812f91cbddb32c93e18c42ffbc777c4b285bbb8cd6905d6b58ca57e06ced91a5884233ddc1fb9de7c02a25faeffe37b11218eb52dd7d41f69 public exponent: 10001 ] 2022-11-06 04:36:40.007 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 04:36:40.008 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 04:36:40.010 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-06 04:36:40.011 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 04:36:40.012 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-06 04:36:40.013 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 04:36:40.013 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 04:36:40.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 04:36:40.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 04:36:40.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 04:36:40.019 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 04:36:40.020 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:36:40.020 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 04:36:40.021 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:36:40.139 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 04:36:40.140 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 04:36:40.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 04:36:40.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 04:36:40.143 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 04:36:40.143 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 04:36:40.144 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:36:40.144 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:36:40.145 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:36:40.145 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:36:40.146 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:36:40.146 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:36:40.147 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 04:36:40.148 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 04:36:40.148 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 04:36:40.149 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 04:36:40.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91406964376128204240651996369758983778924045075 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 02:54:27 UTC 2022 Final Date: Fri Nov 05 02:54:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f] modulus: af5d8840e3b07c2cc0ce43d7668a28d712bf14d7e5716a48900ab9a1c27a07ef40ab5186b706eccd1701fa5585ab18fb30e5d25218dc32138a2777e7bf5831927262f4d3fcd60509b99e701ec6cfbf767a30d07285f649d1c57b60310763d191ec9ecf7c2fdc2afe95f5ffe4b0f5227898e8eaa1aed5fe4d2b0f088f730232f2621e991cd0dc052c003084ca28f226a2e107c48f6ca24f19e1f05140c480ce9ddce43dbe05fd288f3ab97120856c38eb10a986da5ca86e364e1408a08087ad85da37f56187eb5638f3c9507ab4eb4945a911191fbbe89cc0aa50575c88111e3d4b20ee9230cb904fdb9b1f5b25e2426b5c05f23aaf82c9a084b0d0aba9e03f7c24546e4622efe985e3e18991d900a14d333c7abc638ce5eb213a1fdc9d7ef817e1d4de3173ff618fb21749845cb26d829f3bcde72f6348b7735f61d5039a43ba1152303f54f5fba80646760cd5ca7410c7e12e007477897fa4d6df96d881f4862584b16dc102dd39b11c71e4e778d3bfccde0efd1dbf76815b5d6f11d720853f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807 9bccb725082e5afb9478342892eb39db5fc945ea bf78f8d962f7c2c196b7c9c3aa9851d613d310fd c99dafb21a27414526b552188cd3f1eb430afa13 2cb08391c73d24849f20586f4ea9c1080a88c1b1 fca23867a74749bf75097f2d6f498430c1e15005 3b9b111d777aacb3101d3128877f0f569e415909 ef615fc93bc89cf660d2724906c1fe37e228c78f 0a065cf5e993857ca7e007a322afe551655180fa d1e8bea262b401968cf7be3a9a67bfa2822c50ad c6610a99ad74161bc6ec1180a52f423d0512f64c 3bfd797c00ed4fe9fb490b55318db443b828faa9 ee07b551ed8fc799a6403903e0302462e373ba2c dfc3830171ffdac1128a306ba7e562e5ac71750c dfce8b1257ffd9954a150de1c4dfd643f2a7620a 1431e178e3945228ec2a5aecdfadd50a0eded46a 7246abbb28a21e72d035bec22f97c2a887c923b6 1577cae3faeec5a1651b7f1c92d4bf658a9f96fe 49d27686762b63e311d8fc474b7808eb4b91cc99 261737d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:15:cf:5f:72:20:c4:89:69:3d:62:4d:37:4a:37:29:c7:c2:d4:14] modulus: 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 public exponent: 10001 ]