By type
2022-10-25 04:53:04,334 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-25 04:53:05,320 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-25 04:53:05.986 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Oct 25, 2022 4:53:07 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 25, 2022 4:53:07 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 25, 2022 4:53:07 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 25, 2022 4:53:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-25 04:53:08.436 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-25 04:53:08.693 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-10-25 04:53:08.840 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-25 04:53:09.600 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-25 04:53:09.603 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-25 04:53:09.605 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-25 04:53:09.609 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-25 04:53:09.650 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-25 04:53:09.655 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-10-25 04:53:09.754 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-10-25 04:53:10.360 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 25, 2022 4:53:11 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-25 04:53:11.357 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.892 seconds (JVM running for 9.694) Oct 25, 2022 4:53:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-25 04:53:55.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 04:53:55.938 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 04:53:55.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-25 04:53:55.974 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 04:53:55.988 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-25 04:53:55.990 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 04:53:55.991 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 04:53:55.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 04:53:55.993 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 04:53:55.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 04:53:56.002 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 04:53:56.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 04:53:56.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 04:53:56.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 04:53:56.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 04:53:56.058 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 04:53:56.577 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 04:53:56.581 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 04:53:56.582 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 04:53:56.585 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 04:53:56.595 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 04:53:56.597 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 04:53:56.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 04:53:56.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 04:53:56.599 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 04:53:56.614 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 04:53:56.614 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 04:53:56.615 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 04:53:56.620 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 04:53:56.621 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 04:53:56.621 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 04:53:56.622 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 04:53:56.655 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:aa:5b:a0:3a:24:81:f1:28:c9:5f:77:aa:16:ec:64:eb:ea:9e:dd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:04:27.603 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:04:27.606 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:04:27.610 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:04:27.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:04:27.612 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:04:27.613 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:04:27.616 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:04:27.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:04:27.618 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:04:27.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:04:27.627 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:04:27.629 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:04:27.630 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:04:27.630 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:04:27.901 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:04:27.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:04:27.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:04:27.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:04:27.905 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:04:27.906 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:04:27.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:04:27.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:04:27.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:04:27.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:04:27.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:04:27.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:04:27.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:04:27.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:04:27.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:04:27.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:04:27.915 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 9722c69fcdc633bf3f6c6c9f15be2e17e94f45917fe9d16f701b5efa5ad74b8256aa0dbede5c1e7ef8827a6289b7754de44d9ccf1e1c2abfa287c52bea7e8e2b073d344fe761b8ccbb4b806b7baa6ae782992b7f3fd1cf4448bddbe5c846dbdb6c5add25844f594d6e93b19049d8b1f3be03398068815433e9bb124abb7af5b911e213e30b4143d473146c4fc8efa214c334309283b78d421522aea6f623edfbe4774c72cae0f45cfb5ff49a940550bf7d8eb19fbf81517257b3dcdec57ffdbf7fe728de6c4d14094616b864cc9f7039e22ac06bd1e0713e1eae6a3cb76bb138375cba37f1f4d4ffbcf386315dc0c36d870fd5da2bae739fbcf8061cfcef0393c4b2cbdbde8393d070eca81b2333c0df7993791e93efef225faa8d48bd689a1f8a70c7855e4aeb6538e70c52da41078c3232e3978b8062bb8dde35bf9d0d1278f35a935c45842d85f96846f2a56faee94fa9d91286df14df31ae65d43c0eeb6e6608ef9afa1b89fb956a63cd9afdffa35ccff2f2cf7e41b4ba7dab760f46b997 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:3c:7b:1b:84:0b:ad:b6:a4:d3:7b:77:2a:3a:bf:6d:d4:f5:ff:53],[56:66:d1:a4] modulus: c85f6942018e346b3d00ebef937b5202ccf2acb76d2d428e4c4772ce17dbe65ce19fb442e8f714e46f2b9e02da83b70e8d3eee7ff39050e6390da21d80f73ba1287029df1eb44f373d97e82ce8988f3e0d262b29f92d03d9498babc38031c89eb8a30fe2afeda405ea1ce2bc2b78aa660c8cf02125b69fb3487cf6eb7bc0fd96f505985d652180458d6c050441755a761a722995eaaf5e1b85af72b04249f0e6a99df29b2783d29ee89015ac9324369d0fbbe2c3e62833a4bd54ecb6f88e9c515bcdc6c7c90dffd62f781338d03c1397f23e7aaae6cc7d8df78e90cd9d803c4b198c2da6dcca75b2f01dbd16cee0bd892dfb7e75536e51f202be175f324c8465 public exponent: 10001 ] 2022-10-25 06:06:16.871 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:06:16.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:06:16.878 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-25 06:06:16.879 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:06:16.880 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-25 06:06:16.881 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:06:16.881 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:06:16.882 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:06:16.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:06:16.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:06:16.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:06:16.891 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:06:16.892 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:06:16.895 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:06:17.069 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:06:17.070 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:06:17.071 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:06:17.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:06:17.074 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:06:17.075 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:06:17.075 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:06:17.076 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:06:17.076 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:06:17.077 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:06:17.077 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:06:17.077 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:06:17.078 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:06:17.078 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:06:17.079 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:06:17.080 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:06:17.084 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:c5:82:3f:34:75:4b:e9:2d:bc:d0:7b:9f:e8:20:50:c9:c5:60:17],[56:66:d1:a4] modulus: bb3b1dded9cc3282d6c0f1409b3727f48e28410574be14c75cc10efa79a8aa490568fc48fb425301743a7b050a2a79fbe2871c3301c39678cca8e98a704a8382212327dbe6ca1ab61a341bc5579b660a2ca8683e154d9bc7718e4ffec21e639a551842f3d8dfd7bce531f3fdcc9eca243bc3a7193972c585fb279f50c2a7187c3e4ce90a9db79389eb4a359ba8cb3ac588a35d28c8f97f0b9d5b0606b9ceb5f758a351ee27398ce617503af12ae5eadac49e77d2279e16e4219ce3dba6bf166140ff64bbc6de70fd04ffec7d5c346ce1ee27e227367679fb58bbce9cac144af730f78ee219451636bc2ded32b9aaa3ffc674016414e53bc043dba7e26878744f public exponent: 10001 ] 2022-10-25 06:07:40.578 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:07:40.580 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:07:40.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-25 06:07:40.583 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:07:40.584 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-25 06:07:40.584 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:07:40.585 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:07:40.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:07:40.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:07:40.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:07:40.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:07:40.590 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:07:40.591 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:07:40.591 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:07:40.751 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:07:40.752 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:07:40.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:07:40.753 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:07:40.760 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:07:40.763 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:07:40.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:07:40.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:07:40.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:07:40.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:07:40.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:07:40.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:07:40.767 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:07:40.767 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:07:40.768 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:07:40.768 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:07:40.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:d8:f7:94:5d:c5:a6:1c:a9:07:4d:cf:e6:7f:c3:90:3b:78:0d:c7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:09:26.499 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:09:26.502 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:09:26.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:09:26.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:09:26.507 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:09:26.508 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:09:26.508 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:09:26.509 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:09:26.509 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:09:26.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:09:26.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:09:26.514 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:09:26.515 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:09:26.516 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:09:26.653 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:09:26.654 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:09:26.655 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:09:26.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:09:26.657 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:09:26.658 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:09:26.659 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:09:26.659 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:09:26.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:09:26.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:09:26.661 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:09:26.661 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:09:26.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:09:26.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:09:26.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:09:26.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:09:26.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 9722c69fcdc633bf3f6c6c9f15be2e17e94f45917fe9d16f701b5efa5ad74b8256aa0dbede5c1e7ef8827a6289b7754de44d9ccf1e1c2abfa287c52bea7e8e2b073d344fe761b8ccbb4b806b7baa6ae782992b7f3fd1cf4448bddbe5c846dbdb6c5add25844f594d6e93b19049d8b1f3be03398068815433e9bb124abb7af5b911e213e30b4143d473146c4fc8efa214c334309283b78d421522aea6f623edfbe4774c72cae0f45cfb5ff49a940550bf7d8eb19fbf81517257b3dcdec57ffdbf7fe728de6c4d14094616b864cc9f7039e22ac06bd1e0713e1eae6a3cb76bb138375cba37f1f4d4ffbcf386315dc0c36d870fd5da2bae739fbcf8061cfcef0393c4b2cbdbde8393d070eca81b2333c0df7993791e93efef225faa8d48bd689a1f8a70c7855e4aeb6538e70c52da41078c3232e3978b8062bb8dde35bf9d0d1278f35a935c45842d85f96846f2a56faee94fa9d91286df14df31ae65d43c0eeb6e6608ef9afa1b89fb956a63cd9afdffa35ccff2f2cf7e41b4ba7dab760f46b997 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:e2:1a:f9:2a:4c:cb:1b:76:3f:33:d4:37:5a:ac:6f:fd:76:76:06],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:15:30.903 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:15:30.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:15:30.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:15:30.910 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:15:30.910 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:15:30.911 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:15:30.912 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:15:30.912 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:15:30.912 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:15:30.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:15:30.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:15:30.918 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:15:30.919 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:15:30.919 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:15:31.117 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:15:31.119 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:15:31.119 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:15:31.119 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:15:31.121 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:15:31.121 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:15:31.122 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:15:31.122 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:15:31.122 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:15:31.123 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:15:31.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:15:31.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:15:31.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:15:31.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:15:31.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:15:31.126 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:15:31.129 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:08:74:a1:2c:78:f2:9a:02:b2:59:61:40:c3:4a:66:da:b4:72:66],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:19:07.096 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:19:07.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:19:07.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:19:07.103 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:19:07.107 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:19:07.109 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:19:07.110 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:19:07.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:19:07.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:19:07.111 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:19:07.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:19:07.116 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:19:07.119 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:19:07.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:19:07.282 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:19:07.283 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:19:07.283 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:19:07.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:19:07.285 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:19:07.285 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:19:07.286 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:19:07.286 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:19:07.286 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:19:07.287 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:19:07.288 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:19:07.288 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:19:07.289 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:19:07.289 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:19:07.289 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:19:07.290 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:19:07.293 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:49:71:b3:1b:17:51:2d:f2:5f:4f:1d:c5:e3:74:e3:ec:ca:57:35],[56:66:d1:a4] modulus: d5f828d5ecaf1aa09e6a1b115148695c0fb00230f70609852d4e0ba73775438e9155c3d738036f6b6309cfa818998a348995419255515c55d9f7ff762af3e2dde91952dc55fd4dd574dcd7f3b3444827af5e20268f0370955cf7cb24db0560b5fcfdc7268fcd5395c2b8707add8605bc49de7f447588fc598741b8e04d2219c7298b78cc36f5456132f65116a1e1368941fb8f452321f9ba5b85073a36300d6c4ad576feccf10f434c6b6924b98088d8f0485232df81a853c9f3c3ab221dd289fe548522b6a700fa477fe3be805a879d152819c64d7d069f333ec37880097232523a3b9358a95164030a2e3df0f1e5aaf5ef6ab92c287a76c8adc8c00676d81b public exponent: 10001 ] 2022-10-25 06:25:30.459 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:25:30.472 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:25:30.476 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-25 06:25:30.477 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:25:30.478 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-25 06:25:30.479 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:25:30.479 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:25:30.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:25:30.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:25:30.481 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:25:30.487 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:25:30.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:25:30.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:25:30.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:25:30.674 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:25:30.675 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:25:30.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:25:30.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:25:30.679 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:25:30.680 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:25:30.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:25:30.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:25:30.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:25:30.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:25:30.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:25:30.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:25:30.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:25:30.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:25:30.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:25:30.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:25:30.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 9722c69fcdc633bf3f6c6c9f15be2e17e94f45917fe9d16f701b5efa5ad74b8256aa0dbede5c1e7ef8827a6289b7754de44d9ccf1e1c2abfa287c52bea7e8e2b073d344fe761b8ccbb4b806b7baa6ae782992b7f3fd1cf4448bddbe5c846dbdb6c5add25844f594d6e93b19049d8b1f3be03398068815433e9bb124abb7af5b911e213e30b4143d473146c4fc8efa214c334309283b78d421522aea6f623edfbe4774c72cae0f45cfb5ff49a940550bf7d8eb19fbf81517257b3dcdec57ffdbf7fe728de6c4d14094616b864cc9f7039e22ac06bd1e0713e1eae6a3cb76bb138375cba37f1f4d4ffbcf386315dc0c36d870fd5da2bae739fbcf8061cfcef0393c4b2cbdbde8393d070eca81b2333c0df7993791e93efef225faa8d48bd689a1f8a70c7855e4aeb6538e70c52da41078c3232e3978b8062bb8dde35bf9d0d1278f35a935c45842d85f96846f2a56faee94fa9d91286df14df31ae65d43c0eeb6e6608ef9afa1b89fb956a63cd9afdffa35ccff2f2cf7e41b4ba7dab760f46b997 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:0a:a4:19:e7:29:37:15:f8:1a:0e:06:29:07:76:05:e7:e6:be:84],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:29:58.710 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:29:58.714 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:29:58.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:29:58.720 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:29:58.720 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:29:58.721 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:29:58.721 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:29:58.721 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:29:58.722 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:29:58.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:29:58.727 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:29:58.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:29:58.728 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:29:58.729 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:29:58.936 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:29:58.937 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:29:58.937 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:29:58.937 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:29:58.939 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:29:58.939 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:29:58.939 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:29:58.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:29:58.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:29:58.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:29:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:29:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:29:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:29:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:29:58.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:29:58.943 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:29:58.948 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:7a:d9:c4:2d:06:a8:8b:fc:a3:6b:f6:0b:8e:9e:7a:dd:b8:74:f1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:30:15.858 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:30:15.859 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:30:15.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:30:15.862 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:30:15.863 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:30:15.863 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:30:15.864 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:30:15.864 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:30:15.864 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:30:15.865 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:30:15.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:30:15.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:30:15.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:30:15.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:30:15.977 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:30:15.978 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:30:15.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:30:15.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:30:15.980 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:30:15.981 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:30:15.981 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:30:15.981 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:30:15.981 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:30:15.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:30:15.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:30:15.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:30:15.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:30:15.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:30:15.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:30:15.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:30:15.987 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:c9:1d:b3:ac:5f:dc:3c:fe:bc:0d:46:a1:89:e9:f2:6b:c2:b3:5c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:48:17.430 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:48:17.432 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:48:17.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:48:17.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:48:17.436 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:48:17.437 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:48:17.437 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:48:17.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:48:17.438 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:48:17.438 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:48:17.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:48:17.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:48:17.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:48:17.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:17.602 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:48:17.604 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:48:17.604 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:48:17.604 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:17.606 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:48:17.606 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:48:17.607 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:17.607 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:17.607 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:17.609 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:17.610 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:17.610 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:17.610 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:17.611 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:17.611 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:17.613 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:48:17.619 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 9722c69fcdc633bf3f6c6c9f15be2e17e94f45917fe9d16f701b5efa5ad74b8256aa0dbede5c1e7ef8827a6289b7754de44d9ccf1e1c2abfa287c52bea7e8e2b073d344fe761b8ccbb4b806b7baa6ae782992b7f3fd1cf4448bddbe5c846dbdb6c5add25844f594d6e93b19049d8b1f3be03398068815433e9bb124abb7af5b911e213e30b4143d473146c4fc8efa214c334309283b78d421522aea6f623edfbe4774c72cae0f45cfb5ff49a940550bf7d8eb19fbf81517257b3dcdec57ffdbf7fe728de6c4d14094616b864cc9f7039e22ac06bd1e0713e1eae6a3cb76bb138375cba37f1f4d4ffbcf386315dc0c36d870fd5da2bae739fbcf8061cfcef0393c4b2cbdbde8393d070eca81b2333c0df7993791e93efef225faa8d48bd689a1f8a70c7855e4aeb6538e70c52da41078c3232e3978b8062bb8dde35bf9d0d1278f35a935c45842d85f96846f2a56faee94fa9d91286df14df31ae65d43c0eeb6e6608ef9afa1b89fb956a63cd9afdffa35ccff2f2cf7e41b4ba7dab760f46b997 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:22:f2:84:7d:b0:95:42:47:48:5e:59:36:ce:7f:54:a1:51:98:39],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:48:24.244 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-25 06:48:24.245 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-25 06:48:24.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:48:24.247 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:48:24.247 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:48:24.247 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-25 06:48:24.248 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-25 06:48:24.248 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-25 06:48:24.248 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-25 06:48:24.248 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-25 06:48:24.251 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-25 06:48:24.251 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:48:24.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-25 06:48:24.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:24.358 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-25 06:48:24.359 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-25 06:48:24.359 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-25 06:48:24.359 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:24.360 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-25 06:48:24.361 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-25 06:48:24.361 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:24.361 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:24.361 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:24.362 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:24.362 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:24.362 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:24.363 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:24.363 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:24.363 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:24.364 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:48:24.367 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:64:75:e8:4f:8b:cd:e8:de:30:bf:f7:ae:19:ec:80:2f:9c:94:87],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]