By type
2023-01-03 03:28:07,702 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-03 03:28:08,744 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-03 03:28:09.530 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 03, 2023 3:28:11 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 03, 2023 3:28:11 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 03, 2023 3:28:11 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 03, 2023 3:28:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-03 03:28:12.235 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-03 03:28:12.555 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-03 03:28:12.773 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-03 03:28:13.585 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-03 03:28:13.589 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-03 03:28:13.591 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-03 03:28:13.595 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-03 03:28:13.637 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-03 03:28:13.641 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-03 03:28:13.767 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-03 03:28:14.467 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 03, 2023 3:28:15 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-03 03:28:15.491 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.559 seconds (JVM running for 10.29) Jan 03, 2023 3:28:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-03 03:29:07.330 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 03:29:07.337 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 03:29:07.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-03 03:29:07.376 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 03:29:07.396 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-03 03:29:07.399 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 03:29:07.401 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 03:29:07.402 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 03:29:07.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 03:29:07.406 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 03:29:07.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 03:29:07.419 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 03:29:07.470 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 03:29:07.481 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 03:29:07.482 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 03:29:07.486 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 03:29:08.843 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 03:29:08.845 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 03:29:08.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 03:29:08.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 03:29:08.856 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 03:29:08.857 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 03:29:08.857 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 03:29:08.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 03:29:08.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 03:29:08.876 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 03:29:08.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 03:29:08.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 03:29:08.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 03:29:08.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 03:29:08.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 03:29:08.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 03:29:08.919 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:7f:03:3f:fb:74:2e:46:b9:69:04:80:d2:ef:36:9e:47:f0:7d:a2],[56:66:d1:a4] modulus: e01c8c208a0804bd860223feb6d6ba5c32ae48290b033f3ea7cb785e141d6ce84d3151c7109f51d213c4989b05840f08c234f9c5fc6b6392bfb0292ec02c65b08336fc0c79d965b8aa154d1244c4f65407838c14351aabcb84f97d8dd680f23421d8da810ad8d96310d1ac4d7bae8ec49b02dc4c11b5f6bcc2a357699a3398d72d5bf471cf604c661c22fc201eedc37d95518fe6ce15f6876faedea7f36c2bdb9b139ed2c77701e9a36b2e242dccf258d8e2f05514d72314a3c841c558711714e97c1949c40ddee577117e5eb714ceed8c785806b22f5924bcd06912a5d7f53f6a4917e5bc81631a3a18e37553d4e21154f6e27a924d1f3bea47a96bb6ce5ce7 public exponent: 10001 ] 2023-01-03 05:19:04.772 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:19:04.777 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:19:04.782 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:19:04.783 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:19:04.784 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:19:04.786 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:19:04.787 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:19:04.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:19:04.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:19:04.789 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:19:04.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:19:04.796 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:19:04.796 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:19:04.797 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:19:05.312 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:19:05.313 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:19:05.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:19:05.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:19:05.317 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:19:05.318 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:19:05.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:19:05.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:19:05.320 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:19:05.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:19:05.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:19:05.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:19:05.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:19:05.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:19:05.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:19:05.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:19:05.329 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:48:15:3c:2f:88:70:e7:99:78:8c:49:9a:9e:e0:ea:08:58:b5:c5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 05:20:53.112 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:20:53.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:20:53.117 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-03 05:20:53.123 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:20:53.123 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-03 05:20:53.124 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:20:53.125 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:20:53.126 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:20:53.126 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:20:53.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:20:53.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:20:53.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:20:53.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:20:53.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:20:53.597 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:20:53.598 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:20:53.599 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:20:53.600 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:20:53.604 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:20:53.605 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:20:53.606 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:20:53.607 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:20:53.607 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:20:53.608 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:20:53.609 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:20:53.609 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:20:53.610 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:20:53.611 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:20:53.611 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:20:53.612 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:20:53.618 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:92:89:bf:87:38:9b:d6:f5:9f:93:32:16:45:19:1a:b3:cf:2a:00],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 05:22:42.812 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:22:42.814 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:22:42.816 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-03 05:22:42.817 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:22:42.817 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-03 05:22:42.819 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:22:42.819 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:22:42.820 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:22:42.820 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:22:42.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:22:42.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:22:42.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:22:42.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:22:42.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:22:43.291 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:22:43.292 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:22:43.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:22:43.296 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:22:43.304 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:22:43.304 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:22:43.305 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:22:43.306 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:22:43.306 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:22:43.307 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:22:43.307 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:22:43.308 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:22:43.309 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:22:43.310 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:22:43.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:22:43.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:22:43.327 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:ad:92:eb:ff:72:ca:46:05:79:64:d1:65:a1:12:41:4b:7b:4e:0f],[56:66:d1:a4] modulus: e1c898baf0bc154eab1605e734498fcb947a8bf238436d9389aad28af696711df36fc01517dc8680268cf0e480bf1f84864dab219d6614c410bb5c40d0d65056e54e902e5485d695d365176333717795a200dda638adf44d73b2b8a3c30dfcafa04dd536397f96c6fb92610150448f15d9c4b23f32ed87a17c3008a901777ff37d0c8aa1f7b622d6f8150db50fae9efc4843de58d17a8c9ad082e85e7f59fd8e0f814cccc1b624ab535821de50f5258d2a5bb2a029317321ea0251a6c68f433637c47eed9f0ca5e90bfec84ca59cdc3d59732051f87ba4f478a3425678a0bdb6e81e40bbba8c6ddbf295f8046459331195faced214484f9414a97bdb88bf2795 public exponent: 10001 ] 2023-01-03 05:25:48.983 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:25:48.985 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:25:48.986 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:25:48.987 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:25:48.987 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:25:48.988 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:25:48.988 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:25:48.989 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:25:48.989 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:25:48.990 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:25:48.994 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:25:48.995 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:25:48.995 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:25:48.995 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:25:49.409 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:25:49.410 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:25:49.410 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:25:49.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:25:49.412 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:25:49.413 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:25:49.413 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:25:49.413 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:25:49.414 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:25:49.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:25:49.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:25:49.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:25:49.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:25:49.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:25:49.417 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:25:49.418 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:25:49.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:fd:eb:cd:1f:64:54:66:2c:e6:22:80:11:05:72:d6:03:14:a5:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 05:33:01.648 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:33:01.652 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:33:01.655 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:33:01.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:33:01.658 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:33:01.659 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:33:01.659 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:33:01.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:33:01.661 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:33:01.661 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:33:01.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:33:01.670 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:33:01.670 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:33:01.671 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:33:02.029 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:33:02.030 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:33:02.031 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:33:02.031 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:33:02.032 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:33:02.033 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:33:02.034 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:33:02.034 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:33:02.034 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:33:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:33:02.036 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:33:02.036 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:33:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:33:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:33:02.038 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:33:02.039 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:33:02.043 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:4c:cd:0f:51:b7:9d:3c:8e:c8:7f:cf:2e:a3:88:81:1d:f9:fd:ba],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 05:38:46.664 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:38:46.665 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:38:46.668 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:38:46.672 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:38:46.673 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-03 05:38:46.674 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:38:46.674 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:38:46.675 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:38:46.675 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:38:46.675 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:38:46.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:38:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:38:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:38:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:38:47.106 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:38:47.107 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:38:47.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:38:47.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:38:47.109 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:38:47.109 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:38:47.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:38:47.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:38:47.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:38:47.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:38:47.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:38:47.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:38:47.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:38:47.114 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:38:47.114 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:38:47.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:38:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:42:1a:d3:15:8e:68:06:9d:52:f8:02:93:a4:7c:b5:e3:ae:fb:60],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 05:45:59.055 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:45:59.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:45:59.063 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-03 05:45:59.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:45:59.066 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-03 05:45:59.067 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:45:59.068 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:45:59.068 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:45:59.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:45:59.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:45:59.078 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:45:59.081 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:45:59.082 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:45:59.084 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:45:59.675 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:45:59.676 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:45:59.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:45:59.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:45:59.678 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:45:59.679 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:45:59.679 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:45:59.680 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:45:59.680 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:45:59.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:45:59.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:45:59.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:45:59.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:45:59.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:45:59.683 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:45:59.683 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:45:59.688 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:c6:85:8c:fe:60:6f:6c:be:4d:b1:cb:53:0f:a3:ba:e0:b7:15:9d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 05:52:58.386 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:52:58.388 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:52:58.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-03 05:52:58.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:52:58.391 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-03 05:52:58.391 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:52:58.392 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:52:58.393 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:52:58.393 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:52:58.393 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:52:58.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:52:58.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:52:58.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:52:58.399 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:52:58.932 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:52:58.933 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:52:58.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:52:58.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:52:58.938 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:52:58.939 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:52:58.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:52:58.940 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:52:58.940 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:52:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:52:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:52:58.942 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:52:58.942 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:52:58.943 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:52:58.943 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:52:58.943 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:52:58.946 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:24:7c:98:f8:ff:ca:f8:e8:1a:ed:db:16:fd:9f:64:2a:46:43:b8],[56:66:d1:a4] modulus: d9f2efa33d621487daa3f3444c2fd87f659e262be6e2d7fdf9568ae9d1d8db66a85d2a45c6fc655a884702311f794196d4e1a3f526417f11cc6fc31dd5cf1af559ae88b19ba915796e96b0516f86061e468cbcba77e0e9e32faddd538e4b60408fbfd885aab2f6220bef11ace016f3bf5aae9a2e65e37d36854f0a5d5d2d95c9f958536c74d4ce9ea3c721cdd4fd97bf392547160a712d61c5306bc52590e03e69f0e67487e8522df70776a7425956a0611fde22608708502953255aec5a17b13aebd7a480c196fed11a6034cc932b3f498c1515ae78b667ebae990316579abcc444ba660a8cc272836ceb3c699cfcd82b89b0d20218e3693aa22e359d377733 public exponent: 10001 ] 2023-01-03 05:53:21.034 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 05:53:21.035 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 05:53:21.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-03 05:53:21.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 05:53:21.038 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-03 05:53:21.039 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 05:53:21.039 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 05:53:21.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 05:53:21.040 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 05:53:21.040 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 05:53:21.043 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 05:53:21.044 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:53:21.044 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 05:53:21.044 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:53:21.505 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 05:53:21.506 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 05:53:21.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 05:53:21.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 05:53:21.509 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 05:53:21.509 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 05:53:21.509 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:53:21.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:53:21.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:53:21.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:53:21.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:53:21.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:53:21.512 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 05:53:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 05:53:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 05:53:21.514 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 05:53:21.517 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:a5:f5:05:dc:83:4c:01:be:42:d7:0e:50:47:73:9d:c9:26:ca:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-03 06:16:45.768 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 06:16:45.772 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 06:16:45.776 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-03 06:16:45.777 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 06:16:45.778 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-03 06:16:45.779 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 06:16:45.779 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 06:16:45.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 06:16:45.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 06:16:45.781 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 06:16:45.785 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 06:16:45.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 06:16:45.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 06:16:45.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 06:16:46.511 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 06:16:46.511 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 06:16:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 06:16:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 06:16:46.513 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 06:16:46.514 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 06:16:46.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 06:16:46.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 06:16:46.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 06:16:46.516 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 06:16:46.516 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 06:16:46.516 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 06:16:46.517 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 06:16:46.517 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 06:16:46.517 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 06:16:46.518 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 06:16:46.522 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: d01a51c616b673866a0e194f783ca5d39bceb06ec8560834ff49749d00a682f0e82b8bdd3a64654e500d37313d991738c067f0f60f9d8989d5254feafc7851c66afd1102e1375223bcd6b4e739a154df7429c5119f7f703f9686ef30ac3c8491a663117b3b0d544f33d60a89503c52ed6802f1b3c27a6098bbb5ac984da9793fe05b4341343808af9aedbff33598fb6834ecbcb73517c3225e2264b066efbd38e435d82c89e618c5c6415f913c265cce3e8c67eff139027275eeeb8c0e47d70f5dff8a4317aef316cf296104ecc496aaa9f87ec920fc5ad9f07b6bf123f3001fb396e9688d480c641ecefb32773a21fe4c3558e36d95d3fa6597af9efe80aa722fbce40b3c0ad6094ee3a1f70dcb388683d0d67181f4019f3b41022976f4b2effa5000e631ecfafc5ab3e92e44ed1750cb95690dbb928e78e64a526708bf2953e436355840fe0d1600e4935e94aac953d906791cd9987d034c5eefaa60043a17b07ce3510b44970ebef3e96f901919b0ef8dfdb8a6c0def5275d88ceeb5b98e3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:8e:32:ac:71:04:17:38:7f:5a:db:51:44:6e:85:ad:7a:92:92:8b],[56:66:d1:a4] modulus: 92f73b2e6ff7844318583e78423765e1cfd0404aa9e7b13c1279951b852ccc200a0f674f27bce1e2b116ecc90fa95560cb35113bb9fedeb95e768ef2afd2edb570d11244f1ee329f57c746d22fc8ab222053290050f356de5e071a969a2c62e87dbaa53902345ee4583968952b541540e8132ab00d3bd96abc6ec42b38b9e38b38864452dec953af1325b7648443b87cc2d4344605fe7a3da8bc2d1c4566eff7929056b70397732b5b5ebcdfb4d20e5fac0852bb78f3e7c72b580fabd321e5a2923a167956de83d9ec99500f55c912b2c61e71ed5dd1b39a1a7f3db6f96b4d638470d850a31df523cee4eed2185c91f672b625bab5e3e06e1943215e86abfd4b public exponent: 10001 ] 2023-01-03 06:16:56.750 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-03 06:16:56.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-03 06:16:56.754 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-03 06:16:56.756 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-03 06:16:56.757 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-03 06:16:56.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-03 06:16:56.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-03 06:16:56.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-03 06:16:56.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-03 06:16:56.760 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-03 06:16:56.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-03 06:16:56.768 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 06:16:56.769 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-03 06:16:56.769 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 06:16:57.193 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-03 06:16:57.193 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-03 06:16:57.194 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-03 06:16:57.194 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-03 06:16:57.195 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-03 06:16:57.195 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-03 06:16:57.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 06:16:57.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 06:16:57.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 06:16:57.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 06:16:57.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 06:16:57.198 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 06:16:57.199 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-03 06:16:57.199 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-03 06:16:57.199 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-03 06:16:57.200 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-03 06:16:57.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87500886665290319116920714104531256657803214836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 03 03:20:23 UTC 2023 Final Date: Sun Jan 02 03:20:22 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503 bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8 77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc b3de60b294c3bf1895361e69c772035fb7640761 c16dc2c673a2c0f54e00d134b9f1940c1842f2d0 4786010dd18c82055d8cc68533cffbfb2069ed31 c2b92fbb30c7fb9ae8b337653624036cf5da4202 3ffddbce59d645157b28605709737c7820a45bc6 33ef28ee84ddfc274d62c90a92b9ca6e1408e634 390b1a18027d03cb14b046cbbe52a2d54b41f469 ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183 ff2ae67b55d917799297480f538a07be34fa6bbf b7794d5ec6089d73902be38cdfad34a343952a8a 14842815a9830f00c6575ee05376599fb5b0ecfe 2884534e83f6a44532c3542e0bf9f657387fb1df f225186c383411c657fce4724c7f8fdecaed87e5 f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012 070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc 9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418 8dedc773 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:1a:cc:21:c9:bc:6b:4d:2a:a8:30:bc:cd:46:d6:ae:23:67:8d:a8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]