By type
2022-12-09 03:01:51,234 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-09 03:01:53,112 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-09 03:01:54.050 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 09, 2022 3:01:56 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 09, 2022 3:01:56 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 09, 2022 3:01:56 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 09, 2022 3:01:56 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-09 03:01:57.598 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-09 03:01:57.992 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-09 03:01:58.234 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-09 03:01:59.123 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-09 03:01:59.126 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-09 03:01:59.127 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-09 03:01:59.131 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-09 03:01:59.177 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-09 03:01:59.181 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-12-09 03:01:59.328 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-09 03:02:00.171 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 09, 2022 3:02:01 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-09 03:02:01.304 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.187 seconds (JVM running for 13.438) Dec 09, 2022 3:02:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-09 03:04:28.398 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 03:04:28.412 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 03:04:28.469 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-09 03:04:28.474 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 03:04:28.501 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-09 03:04:28.505 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 03:04:28.506 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 03:04:28.508 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 03:04:28.509 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 03:04:28.516 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 03:04:28.526 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 03:04:28.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 03:04:28.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 03:04:28.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 03:04:28.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 03:04:28.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 03:04:29.319 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 03:04:29.322 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 03:04:29.323 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 03:04:29.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 03:04:29.335 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 03:04:29.336 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 03:04:29.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 03:04:29.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 03:04:29.338 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 03:04:29.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 03:04:29.361 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 03:04:29.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 03:04:29.381 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 03:04:29.382 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 03:04:29.382 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 03:04:29.384 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 03:04:29.441 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:19:07:c6:5e:83:0d:f6:3b:8d:29:c1:47:23:5a:70:2f:69:fc:a4],[56:66:d1:a4] modulus: 9c2a4f043047e2b8b71935af7f5fb5faa4be512b6a01a8eefd376eb02f57a9e3cd41338b90ff17bc0826565a70b2f8cba221c2bf59b3f3c90588b1a2a0316d15ac22e4cbdc6791603c2e20952519588bd9189c1cb2b6d84782753b59a57fa26df33b8761b918ae4c4c2b68b5153963492700376fea7f588ebae1cce3b16ddcd615ea7db90ff48c48f24d0458695cc05e4a7a4fc7c8cfb7883268d9e4d77e2a806bbececf860cd9e9c02b2d9f9608ae312e88ddbe907376291db0f72f73ddbcaac1e9978e45a0d52446890cb6ad13673318c853fe3283065f9cfd1e270110ecb8d2d4021a62fba3fedbe89a9bf9f7454d6b6d39760034d49d59cf3d931c913e47 public exponent: 10001 ] 2022-12-09 04:45:37.822 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 04:45:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 04:45:37.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 04:45:37.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 04:45:37.833 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 04:45:37.833 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 04:45:37.834 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 04:45:37.835 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 04:45:37.835 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 04:45:37.836 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 04:45:37.842 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 04:45:37.843 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:45:37.844 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:45:37.844 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:45:38.096 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 04:45:38.099 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 04:45:38.099 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 04:45:38.099 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:45:38.103 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 04:45:38.104 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 04:45:38.105 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:45:38.105 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:45:38.106 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:45:38.108 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:45:38.108 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:45:38.109 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:45:38.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:45:38.111 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:45:38.111 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:45:38.113 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 04:45:38.117 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:e0:0d:00:95:47:e2:a3:07:1a:60:aa:00:83:bf:b3:4c:23:d7:92],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 04:47:18.047 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 04:47:18.049 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 04:47:18.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-09 04:47:18.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 04:47:18.054 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-09 04:47:18.055 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 04:47:18.056 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 04:47:18.057 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 04:47:18.057 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 04:47:18.061 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 04:47:18.072 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 04:47:18.073 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:47:18.073 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:47:18.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:47:18.244 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 04:47:18.245 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 04:47:18.246 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 04:47:18.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:47:18.251 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 04:47:18.252 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 04:47:18.252 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:47:18.253 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:47:18.253 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:47:18.255 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:47:18.255 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:47:18.256 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:47:18.257 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:47:18.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:47:18.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:47:18.260 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 04:47:18.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:bb:5c:0f:d9:09:8d:44:1e:91:c3:1b:36:6f:cb:7b:59:bd:aa:5d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 04:49:34.333 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 04:49:34.335 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 04:49:34.337 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-09 04:49:34.337 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 04:49:34.338 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-09 04:49:34.339 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 04:49:34.340 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 04:49:34.340 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 04:49:34.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 04:49:34.352 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 04:49:34.358 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 04:49:34.360 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:49:34.361 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:49:34.361 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:49:34.591 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 04:49:34.593 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 04:49:34.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 04:49:34.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:49:34.598 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 04:49:34.600 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 04:49:34.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:49:34.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:49:34.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:49:34.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:49:34.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:49:34.605 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:49:34.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:49:34.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:49:34.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:49:34.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 04:49:34.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:4b:f7:d2:78:3f:21:c7:aa:bf:f6:3e:ad:66:e7:ba:3d:6c:ed:e4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 04:52:12.422 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 04:52:12.426 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 04:52:12.429 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 04:52:12.431 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 04:52:12.432 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 04:52:12.433 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 04:52:12.433 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 04:52:12.434 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 04:52:12.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 04:52:12.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 04:52:12.440 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 04:52:12.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:52:12.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:52:12.442 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:52:12.591 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 04:52:12.592 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 04:52:12.592 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 04:52:12.593 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:52:12.594 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 04:52:12.594 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 04:52:12.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:52:12.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:52:12.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:52:12.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:52:12.597 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:52:12.597 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:52:12.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:52:12.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:52:12.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:52:12.599 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 04:52:12.602 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: b01d16ad16ac7fbada39a8fc9cc3faf893bdce0650521cf61795912fb32ad33a54c6e5364d5b8b58cbcd7d13e5abcf27992a32e71e206e9e2dec7cc028fdbdb9e6c00785caba26667ef7fb53b81dc76445d3900696fcc162ced198f6497a0c4cfebc0ec73a35ac259e856ae8335549c61fe3d6a2094bcca04c168267fa242e0980dd4fdda2a47cb2a0229ee2050433a0e8aa582636e45e8c51401ac64c7b64701f5bd32537d719bbac7d3b37545d00b4807eb394b8be8ef2c128ab027b4ca87bb3d928d84c87f36e89939058c1e186cd5d106dcf0d2306e051239587215019c7fa2eb033d17dc5f992ac36963537fa08d5312aa56b81575d5176fe916b5cf58ea4fd2505cef7afb3f0dc98f1be721eebed39b36b6919c81f7fa33523e8e35e57015c07a698067ec1371c44c86cfd4aa6f508e4f005a1e4351ee6314edbb8a2064ccc13d56e24ef0ad04a564d7ac285247f59d9458ea76414eabe4bfda3b21c6d0a23206ea8abd843858d52a837a8885e3f261ccf2e364c4eada1d47b3d10b3a3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:e7:3b:9d:c8:ea:d6:a3:bf:98:40:be:c4:b6:de:b8:70:82:84:0b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 04:59:05.352 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 04:59:05.355 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 04:59:05.358 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 04:59:05.360 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 04:59:05.361 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 04:59:05.362 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 04:59:05.363 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 04:59:05.363 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 04:59:05.364 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 04:59:05.364 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 04:59:05.371 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 04:59:05.374 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:59:05.374 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 04:59:05.374 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:59:05.602 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 04:59:05.607 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 04:59:05.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 04:59:05.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 04:59:05.612 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 04:59:05.618 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 04:59:05.619 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:59:05.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:59:05.626 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:59:05.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:59:05.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:59:05.630 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:59:05.631 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 04:59:05.631 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 04:59:05.632 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 04:59:05.633 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 04:59:05.639 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:34:42:6b:b9:99:2b:90:d8:01:77:b8:5c:ec:7f:de:80:eb:e2:c5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 05:04:30.990 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:04:30.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:04:30.997 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 05:04:30.998 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:04:30.999 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 05:04:30.999 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:04:31.000 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:04:31.001 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:04:31.001 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:04:31.002 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:04:31.007 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:04:31.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:04:31.009 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:04:31.009 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:04:31.204 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:04:31.205 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:04:31.205 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:04:31.206 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:04:31.208 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:04:31.209 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:04:31.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:04:31.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:04:31.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:04:31.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:04:31.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:04:31.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:04:31.213 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:04:31.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:04:31.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:04:31.215 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:04:31.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:71:d5:50:1b:8c:b7:17:98:2b:e1:47:ed:69:b3:51:50:7f:07:9b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 05:10:45.831 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:10:45.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:10:45.838 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 05:10:45.839 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:10:45.839 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 05:10:45.840 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:10:45.840 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:10:45.841 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:10:45.841 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:10:45.841 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:10:45.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:10:45.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:10:45.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:10:45.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:10:46.001 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:10:46.002 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:10:46.003 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:10:46.003 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:10:46.013 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:10:46.014 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:10:46.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:10:46.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:10:46.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:10:46.018 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:10:46.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:10:46.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:10:46.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:10:46.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:10:46.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:10:46.021 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:10:46.027 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:0f:e8:79:d3:c3:d6:a6:58:d6:19:d0:e0:a0:0b:22:e2:92:13:58],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 05:16:15.257 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:16:15.261 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:16:15.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 05:16:15.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:16:15.267 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-09 05:16:15.268 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:16:15.269 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:16:15.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:16:15.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:16:15.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:16:15.275 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:16:15.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:16:15.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:16:15.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:16:15.420 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:16:15.421 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:16:15.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:16:15.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:16:15.423 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:16:15.423 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:16:15.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:16:15.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:16:15.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:16:15.425 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:16:15.425 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:16:15.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:16:15.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:16:15.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:16:15.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:16:15.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:16:15.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:53:c1:32:96:0d:f3:f8:ab:71:2e:45:78:ce:d2:80:c5:2c:17:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 05:22:47.605 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:22:47.606 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:22:47.608 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-09 05:22:47.610 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:22:47.611 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-09 05:22:47.611 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:22:47.612 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:22:47.613 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:22:47.613 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:22:47.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:22:47.618 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:22:47.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:22:47.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:22:47.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:22:47.745 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:22:47.745 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:22:47.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:22:47.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:22:47.747 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:22:47.748 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:22:47.749 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:22:47.749 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:22:47.749 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:22:47.750 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:22:47.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:22:47.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:22:47.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:22:47.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:22:47.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:22:47.753 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:22:47.756 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:8b:62:4d:43:4e:aa:53:cf:88:d5:6f:de:f9:5f:40:81:43:f6:4d],[56:66:d1:a4] modulus: caa09120e435215caa4b2cd9a84192c1a9c0f7d15647eabb609c2a5d4fb61e6b62059eaac5cc31328d079c3a8683f299ac60e3e828bd8432248c94154a17b384da908e92ed7352e663011c93eaddd3e6d90b2a45564cefb29eff438b4c8dd3d33d69207861635605060982d1e582d9fd55d5b526ef07ecd07d9fbe3e51113a72cbfbe470a9a1fa09bccb9834ce7b376d0b2c9435a7a54797e675a1844b1f5cc45d0428025296ff733d1dea98b9513d0cc9ae524710d26da6ac75c965ddab5eaf01428dbe2abdd3bc66fbe26a9bccd32105ebdfb804e76d582db56743df81b62bd65758fcbfead4438ec79a2720d41c303ae1692f19a14726c9ab4b4ca55cd38f public exponent: 10001 ] 2022-12-09 05:29:03.652 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:29:03.655 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:29:03.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-09 05:29:03.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:29:03.660 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-09 05:29:03.660 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:29:03.661 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:29:03.661 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:29:03.662 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:29:03.663 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:29:03.667 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:29:03.668 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:29:03.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:29:03.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:29:03.819 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:29:03.820 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:29:03.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:29:03.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:29:03.823 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:29:03.823 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:29:03.823 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:29:03.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:29:03.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:29:03.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:29:03.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:29:03.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:29:03.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:29:03.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:29:03.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:29:03.828 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:29:03.831 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:cb:94:a1:2e:0d:cf:a1:86:47:cf:10:d9:35:e9:de:1b:fa:04:03],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 05:29:19.478 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:29:19.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:29:19.481 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-09 05:29:19.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:29:19.482 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-09 05:29:19.483 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:29:19.483 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:29:19.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:29:19.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:29:19.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:29:19.488 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:29:19.488 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:29:19.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:29:19.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:29:19.593 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:29:19.594 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:29:19.594 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:29:19.594 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:29:19.595 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:29:19.596 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:29:19.596 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:29:19.596 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:29:19.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:29:19.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:29:19.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:29:19.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:29:19.599 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:29:19.599 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:29:19.599 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:29:19.600 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:29:19.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:c1:13:85:7f:12:bb:c9:38:9f:2d:cb:e9:b6:32:c1:35:28:8f:93],[56:66:d1:a4] modulus: f156719392465fefebcfd1b506f798036b3f917086b18207a0483decc5950ab2142d079120fbf14cda3827d95a14cd0be9bee42b70e364e9432255e121da2efdc40480046d352dfc48a7e7a9afcf4d5109291208297d99fa9ea5d15597ba2cff98681de165f5fb5915d23e9f2e856acf0f46d313b972d0105f3de14821fc029e11bbfe117ff4a1ee8220cddf766cea8b9a2d27925c9239f086cec0fc63a35a281e90dc78ba03eaeb30eb0b5bfc561f6bea5ce64860748836366fd915375e91553efe54fac5b8921789a218a8d5bc662e7a80c695791b6e961ccffd77c68e0e39b23fa7640d5d7d2bad1c3ef6a53fd7bba078bd55382b8d1590218873d169be23 public exponent: 10001 ] 2022-12-09 05:53:01.407 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:53:01.409 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:53:01.411 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-09 05:53:01.412 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:53:01.413 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-09 05:53:01.414 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:53:01.414 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:53:01.415 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:53:01.415 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:53:01.419 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:53:01.423 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:53:01.424 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:53:01.425 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:53:01.425 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:53:01.605 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:53:01.606 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:53:01.606 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:53:01.606 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:53:01.609 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:53:01.609 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:53:01.610 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:53:01.610 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:53:01.610 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:53:01.611 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:53:01.611 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:53:01.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:53:01.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:53:01.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:53:01.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:53:01.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:53:01.617 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:10:6a:bc:69:2e:cc:d9:49:79:a3:80:a4:ca:81:51:26:b5:42:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-09 05:53:08.682 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-09 05:53:08.683 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-09 05:53:08.685 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-09 05:53:08.685 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-09 05:53:08.686 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-09 05:53:08.686 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-09 05:53:08.687 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-09 05:53:08.687 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-09 05:53:08.687 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-09 05:53:08.688 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-09 05:53:08.692 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-09 05:53:08.693 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:53:08.693 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-09 05:53:08.693 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:53:08.824 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-09 05:53:08.825 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-09 05:53:08.826 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-09 05:53:08.826 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-09 05:53:08.827 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-09 05:53:08.828 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-09 05:53:08.828 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:53:08.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:53:08.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:53:08.830 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:53:08.830 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:53:08.830 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:53:08.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-09 05:53:08.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-09 05:53:08.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-09 05:53:08.832 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-09 05:53:08.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 382664610872834309034305163330799600775123206332 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 09 02:59:02 UTC 2022 Final Date: Wed Dec 08 02:59:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3e45515f55d8accded56309bbb04e8443e7262c1 826972ef93b2ea8956bfd73edccc5f0787537504 25007c62b479c7911275162bdc018180656a2d9e 44eae563fd5fefd5baea5429b241f165e63571d8 15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a ba1ba462758102281802994a586f93dfde9ad6b6 998cae0b93d4424780a84c0e1fd33e822e34685e 6bf86d7987f2b0918657a60e7384c825d3de610c bee3d617cdc4baef66b7d5103260b19fce7d8d86 5f60da16b7348085c5585005ea723c926eab1f22 f8d8df64f8823282bca782fc8e134849769b5856 5953c11a042fa682d5d1e00328ebce8b715ad899 7e081dc7a1bc504f2009bbcf3294d070e27ca85a e91379772af63a0f2c26751b0f39171f1131215f 9585f251bfe71561238fb907843affffd177300a 6efad546ca2183ef13284c90cf234569ec76e9b0 fa973953b770adee62647ba533de2e3c1ed1b70f 3e8705666d7ab7e3986b5245bb3be6d1667ff8bf cbe3abc3bd1c488420e46e5827c591564ca97786 fcf95929 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:a7:9e:af:8f:8c:61:2b:aa:f0:85:69:ec:b4:0d:b7:75:9f:bf:61],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]