By type
2023-01-13 11:48:50,341 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-13 11:48:52,504 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-13 11:48:54.129 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 13, 2023 11:48:59 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 13, 2023 11:48:59 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 13, 2023 11:48:59 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 13, 2023 11:48:59 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-13 11:49:00.542 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-13 11:49:01.240 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-13 11:49:01.624 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-13 11:49:03.523 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-13 11:49:03.547 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-13 11:49:03.551 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-13 11:49:03.561 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-13 11:49:03.658 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2023-01-13 11:49:03.670 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-13 11:49:03.954 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-13 11:49:05.329 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 13, 2023 11:49:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-13 11:49:07.244 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 18.828 seconds (JVM running for 23.763) Jan 13, 2023 11:49:20 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-13 11:49:49.242 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 11:49:49.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 11:49:49.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-13 11:49:49.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 11:49:49.369 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-13 11:49:49.373 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 11:49:49.374 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 11:49:49.376 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 11:49:49.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 11:49:49.384 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 11:49:49.398 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 11:49:49.404 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 11:49:49.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 11:49:49.501 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 11:49:49.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 11:49:49.508 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 11:49:50.848 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 11:49:50.854 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 11:49:50.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 11:49:50.857 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 11:49:50.877 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 11:49:50.883 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 11:49:50.886 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 11:49:50.886 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 11:49:50.887 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 11:49:50.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 11:49:50.923 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 11:49:50.924 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 11:49:50.936 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 11:49:50.937 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 11:49:50.938 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 11:49:50.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 11:49:50.998 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:0c:29:ea:47:56:9d:a0:3b:b1:02:61:a3:7f:04:3e:00:80:0b:5e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:10:13.494 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:10:13.503 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:10:13.513 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:10:13.515 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:10:13.516 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:10:13.517 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:10:13.518 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:10:13.518 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:10:13.519 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:10:13.520 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:10:13.528 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:10:13.530 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:10:13.531 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:10:13.532 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:10:13.833 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:10:13.834 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:10:13.834 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:10:13.835 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:10:13.852 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:10:13.853 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:10:13.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:10:13.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:10:13.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:10:13.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:10:13.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:10:13.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:10:13.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:10:13.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:10:13.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:10:13.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:10:13.880 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:2e:ad:a8:42:01:16:8f:00:2f:e2:6a:b3:d5:29:40:77:3f:ce:0c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:17:23.322 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:17:23.326 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:17:23.330 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:17:23.332 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:17:23.332 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:17:23.333 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:17:23.334 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:17:23.334 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:17:23.335 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:17:23.337 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:17:23.343 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:17:23.345 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:17:23.345 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:17:23.346 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:17:23.609 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:17:23.610 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:17:23.611 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:17:23.611 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:17:23.615 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:17:23.616 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:17:23.616 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:17:23.617 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:17:23.620 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:17:23.622 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:17:23.622 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:17:23.623 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:17:23.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:17:23.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:17:23.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:17:23.628 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:17:23.634 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:e5:5c:2d:3f:76:45:08:15:77:27:24:5a:6f:b0:2c:10:17:27:e9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:18:37.226 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:18:37.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:18:37.230 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-13 15:18:37.231 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:18:37.241 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-13 15:18:37.244 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:18:37.245 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:18:37.246 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:18:37.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:18:37.248 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:18:37.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:18:37.256 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:18:37.256 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:18:37.257 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:18:37.470 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:18:37.470 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:18:37.471 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:18:37.471 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:18:37.474 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:18:37.475 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:18:37.476 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:18:37.476 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:18:37.476 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:18:37.477 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:18:37.478 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:18:37.479 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:18:37.480 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:18:37.480 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:18:37.481 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:18:37.482 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:18:37.488 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: cfc25138d78821d546e47077b98af397ca96671ce92cc7ec581fe4d2d46b9fdadca8dca8579ded953648da9c3de5a364590fdc0a3f50f06853bef0a591d16a129c82098f4eb0a4a1002fb299f076cbddc11e296fa60cbe5e8be66adf4cbe33bb87ea845ed9cc952290452a50d40f40427120879740bbb36f13b11f3a1610c5c2e4d08c15b8c01f9d85c4c189a7e201500c8d68fdd06485602e807d368d3d8dea58cf1cdc2ffe5aee01a69c7df262dfda99f1b44ec5379e8ef58b03d76e20324de4a5ccdfda4ba4361755a6425b59727d6b8d891ff6bb0233292daf0d086fc125a3709e800e12ac52db797968a898f5a963539b17098d9a7e5ad09a18f2aadffdd72970b6e59aaee9ab386330dfcb73ed14e022c835c2bd70c110d6345028145346f9fac4e635fd2689e38828afdf3a516efddc1d24ed3e2e12ebfb1fd377a732a29bbb263f76c389d75f878d8fc94ea89224cb2297c85c7a6b6435bf7c56b1c91d8190c5f2346ebce7d8334014314acb0597af4e863cc849eeb6f47dab71fb43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:5f:2c:10:67:c6:6f:5c:d4:00:2c:20:be:2d:75:59:21:df:62:4b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:21:02.835 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:21:02.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:21:02.839 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-13 15:21:02.839 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:21:02.840 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-13 15:21:02.841 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:21:02.841 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:21:02.842 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:21:02.843 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:21:02.843 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:21:02.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:21:02.851 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:21:02.852 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:21:02.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:21:03.074 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:21:03.075 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:21:03.076 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:21:03.076 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:21:03.078 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:21:03.079 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:21:03.080 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:21:03.081 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:21:03.081 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:21:03.083 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:21:03.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:21:03.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:21:03.086 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:21:03.087 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:21:03.087 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:21:03.089 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:21:03.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:98:b6:b1:92:ed:98:b0:1f:63:69:aa:c9:b0:8b:1f:26:94:91:a5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:23:53.889 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:23:53.890 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:23:53.892 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:23:53.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:23:53.895 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:23:53.896 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:23:53.896 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:23:53.897 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:23:53.897 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:23:53.898 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:23:53.905 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:23:53.906 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:23:53.907 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:23:53.907 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:23:54.182 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:23:54.186 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:23:54.186 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:23:54.187 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:23:54.189 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:23:54.190 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:23:54.191 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:23:54.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:23:54.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:23:54.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:23:54.197 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:23:54.198 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:23:54.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:23:54.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:23:54.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:23:54.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:23:54.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:4e:a5:2c:bc:d9:e6:9f:00:aa:10:70:23:c2:72:78:77:0b:b4:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:32:04.880 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:32:04.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:32:04.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:32:04.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:32:04.905 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:32:04.906 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:32:04.907 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:32:04.908 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:32:04.909 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:32:04.909 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:32:04.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:32:04.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:32:04.941 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:32:04.942 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:32:05.381 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:32:05.383 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:32:05.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:32:05.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:32:05.386 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:32:05.386 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:32:05.388 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:32:05.389 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:32:05.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:32:05.391 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:32:05.392 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:32:05.393 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:32:05.394 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:32:05.394 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:32:05.394 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:32:05.396 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:32:05.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:28:b6:3d:2a:81:3d:0d:bf:68:90:cd:6b:9a:e5:00:2c:60:8a:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:39:15.936 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 15:39:15.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 15:39:15.957 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:39:15.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:39:15.965 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:39:15.966 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 15:39:15.966 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 15:39:15.967 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 15:39:15.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 15:39:15.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 15:39:15.986 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 15:39:15.988 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:39:15.989 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 15:39:15.989 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:39:16.298 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 15:39:16.299 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 15:39:16.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 15:39:16.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:39:16.303 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 15:39:16.303 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 15:39:16.304 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:39:16.304 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:39:16.305 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:39:16.306 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:39:16.306 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:39:16.306 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:39:16.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:39:16.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:39:16.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:39:16.309 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:39:16.314 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:d9:82:8e:87:23:a5:86:ef:1e:b7:44:2d:ac:45:54:48:71:d9:27],[56:66:d1:a4] modulus: ab0cc57f6ab58d3e81dea3031e4cfc72a868815fd20fd7c9556f45b695fc4dbd07496b59028111a7ec3961383a1b872329990be6f922d77afc4d0f9f709c7640f1e062274fc34efa9f72f8de1c0a36779de30a87b9c4491fe2b79340dd16b81b3f4832775fc7fd22628b0c1940962631e91c84f3b878df40161ad592775415527084c7959c51bb229845e5e942023d2eea67f60cf5e99998dbf20403c3e5b19af7e95136001aa16b9fd72ed145ca471746d57bb60914e05aea47ed11cc58ef23831aaa9ca0f5d97a37c9ce918f946b63e1041643fde154695511030144f5aeff75b3693cde0c0c753514a40a6d90ddc5fd6c94fd0d586cfea8bde652566797bf public exponent: 10001 ] 2023-01-13 16:51:02.138 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 16:51:02.145 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 16:51:02.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-13 16:51:02.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 16:51:02.158 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-13 16:51:02.166 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 16:51:02.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 16:51:02.168 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 16:51:02.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 16:51:02.170 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 16:51:02.186 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 16:51:02.189 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 16:51:02.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 16:51:02.196 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 16:51:02.530 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 16:51:02.531 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 16:51:02.532 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 16:51:02.532 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 16:51:02.536 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 16:51:02.537 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 16:51:02.551 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 16:51:02.554 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 16:51:02.555 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 16:51:02.556 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 16:51:02.557 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 16:51:02.557 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 16:51:02.558 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 16:51:02.559 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 16:51:02.559 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 16:51:02.561 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 16:51:02.572 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:b8:f1:b1:4d:87:aa:b4:0e:3f:4a:c2:a5:42:33:5a:58:c7:6a:01],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 17:00:16.247 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 17:00:16.251 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 17:00:16.256 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:00:16.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:00:16.258 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:00:16.268 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 17:00:16.269 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 17:00:16.270 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 17:00:16.270 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 17:00:16.271 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 17:00:16.278 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 17:00:16.280 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:00:16.280 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:00:16.281 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:16.652 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 17:00:16.653 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 17:00:16.654 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 17:00:16.654 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:16.656 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 17:00:16.657 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 17:00:16.657 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:16.657 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:16.658 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:16.659 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:16.661 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:16.661 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:16.663 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:16.663 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:16.664 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:16.665 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:00:16.687 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:7c:6b:d8:4a:6d:37:f6:0a:cb:5c:bd:f5:f6:4b:29:4f:51:c3:73],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 17:00:39.791 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 17:00:39.793 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 17:00:39.796 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:00:39.798 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:00:39.801 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:00:39.809 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 17:00:39.810 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 17:00:39.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 17:00:39.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 17:00:39.812 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 17:00:39.818 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 17:00:39.820 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:00:39.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:00:39.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:40.196 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 17:00:40.197 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 17:00:40.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 17:00:40.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:40.207 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 17:00:40.209 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 17:00:40.210 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:40.210 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:40.211 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:40.221 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:40.222 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:40.222 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:40.224 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:40.230 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:40.231 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:40.237 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:00:40.251 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:fc:55:34:97:02:28:ec:b5:14:1c:00:fe:7e:f0:3f:63:99:b3:2e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 17:30:44.491 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 17:30:44.495 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 17:30:44.500 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:30:44.502 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:30:44.502 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:30:44.503 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 17:30:44.504 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 17:30:44.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 17:30:44.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 17:30:44.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 17:30:44.515 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 17:30:44.517 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:30:44.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:30:44.519 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:45.035 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 17:30:45.036 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 17:30:45.037 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 17:30:45.037 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:45.039 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 17:30:45.039 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 17:30:45.040 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:45.040 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:45.041 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:45.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:45.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:45.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:45.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:45.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:45.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:45.054 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:30:45.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:22:06:7b:fc:a1:6d:ce:09:0b:f4:85:15:03:63:d6:5a:8d:03:26],[56:66:d1:a4] modulus: c1b818fa6545c26a6ceb844a86016e37e375eba5a5dfe85f06aa4112f854f111d4d03fddff2bcf33e1dd68485cd96908771db40ebee6b8c4d28fbc83e763fc967f898040eb710ead84eb414daadb66f8f7f1986e8f223961ecfbc959966b309414a6b7a424c0e0322baaff409706509cc252bdc87fc18daf09cdd1ee9d2d3e81b49f3e37817640d0e0880ff7634890f7c2bb0ef66b7a26667e8528bded79c1cc3e172758c10ffcd0339679e6c988feeb954dc4d0f744a6f21792082cd5739408daf144595204111be2c6ed55b7b530a362bbd9abd4ca3b9600e7f8a75f375ebcbe541ce8b058028046a091a4242adcc1a7420ffb592da48643cee435e3841a1b public exponent: 10001 ] 2023-01-13 17:30:51.396 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 17:30:51.398 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 17:30:51.400 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:30:51.400 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:30:51.401 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:30:51.402 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 17:30:51.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 17:30:51.403 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 17:30:51.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 17:30:51.405 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 17:30:51.409 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 17:30:51.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:30:51.411 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 17:30:51.412 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:51.631 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 17:30:51.632 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 17:30:51.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 17:30:51.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:51.639 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 17:30:51.641 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 17:30:51.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:51.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:51.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:51.647 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:51.648 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:51.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:51.651 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:51.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:51.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:51.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:30:51.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:f3:81:e2:da:d6:32:5c:6f:4e:fe:cf:f2:86:17:2a:f5:d6:df:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]