By type
2022-11-01 05:04:11,884 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-01 05:04:12,754 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-01 05:04:13.441 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 01, 2022 5:04:15 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 01, 2022 5:04:15 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 01, 2022 5:04:15 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 01, 2022 5:04:15 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-01 05:04:15.855 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-01 05:04:16.153 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-01 05:04:16.327 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-01 05:04:17.013 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-01 05:04:17.016 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-01 05:04:17.017 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-01 05:04:17.021 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-01 05:04:17.063 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-01 05:04:17.066 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-01 05:04:17.183 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-01 05:04:17.899 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 01, 2022 5:04:18 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-01 05:04:18.849 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.801 seconds (JVM running for 9.51) Nov 01, 2022 5:04:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-01 05:05:06.688 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 05:05:06.694 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 05:05:06.730 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-01 05:05:06.733 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 05:05:06.749 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-01 05:05:06.751 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 05:05:06.752 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 05:05:06.753 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 05:05:06.753 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 05:05:06.757 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 05:05:06.765 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 05:05:06.769 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 05:05:06.817 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 05:05:06.822 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 05:05:06.822 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 05:05:06.825 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 05:05:07.341 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 05:05:07.344 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 05:05:07.344 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 05:05:07.346 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 05:05:07.355 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 05:05:07.356 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 05:05:07.357 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 05:05:07.357 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 05:05:07.357 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 05:05:07.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 05:05:07.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 05:05:07.373 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 05:05:07.379 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 05:05:07.379 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 05:05:07.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 05:05:07.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 05:05:07.412 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:1e:7f:9f:fb:2d:86:74:24:e0:f2:d4:88:61:c2:1d:42:bd:06:43],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:22:00.836 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:22:00.840 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:22:00.844 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:22:00.845 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:22:00.845 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:22:00.846 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:22:00.847 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:22:00.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:22:00.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:22:00.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:22:00.853 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:22:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:22:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:22:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:22:01.066 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:22:01.067 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:22:01.067 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:22:01.068 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:22:01.070 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:22:01.071 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:22:01.071 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:22:01.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:22:01.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:22:01.074 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:22:01.074 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:22:01.075 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:22:01.076 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:22:01.076 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:22:01.077 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:22:01.078 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:22:01.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:34:c6:d6:54:a1:14:da:09:e0:e1:77:cc:4e:88:98:c7:85:d1:b5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:23:48.778 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:23:48.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:23:48.781 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-01 06:23:48.782 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:23:48.783 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-01 06:23:48.788 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:23:48.789 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:23:48.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:23:48.790 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:23:48.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:23:48.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:23:48.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:23:48.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:23:48.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:23:48.975 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:23:48.977 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:23:48.977 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:23:48.978 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:23:48.981 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:23:48.982 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:23:48.983 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:23:48.983 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:23:48.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:23:48.985 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:23:48.985 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:23:48.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:23:48.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:23:48.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:23:48.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:23:48.989 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:23:48.992 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:49:b5:d8:87:7a:ed:54:3a:a4:43:7c:87:bb:7f:5e:cf:6b:fb:45],[56:66:d1:a4] modulus: aea2ffbf1f979ac25ec20eb97802cb222bc7cf2716fe4e5730a63825229f2a455f712f16606791cb7b3dd6012849ce4cd7dab218d18d6dfbccf11ffaf7f8221174896803995f2e2bfd922fff55aeb01da9c435c48e6c03b5623255e2d7a2646852169aed7f7e1b9852c82530a4d03502eae81cf30ef0071247625c90922e5f03a9d2570e17d7c2d4f0e6c2e4579a085ba13c3f04a42dc7d27223c061a896f6877771424353fcbfaa5e88836e1ba6b47c238f656f653a66cf5e43c588d714bf6d0e4cce14b55a0577cb6fba422985ff03f7286d3fddb37eb1b6353787f218684c38245bfe5512caacc96cb23cd365f006ca137730644a69e0eea5fd1384a15489 public exponent: 10001 ] 2022-11-01 06:24:57.493 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:24:57.495 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:24:57.497 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-01 06:24:57.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:24:57.499 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-01 06:24:57.500 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:24:57.501 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:24:57.502 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:24:57.503 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:24:57.503 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:24:57.510 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:24:57.511 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:24:57.511 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:24:57.512 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:24:57.633 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:24:57.634 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:24:57.635 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:24:57.635 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:24:57.637 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:24:57.637 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:24:57.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:24:57.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:24:57.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:24:57.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:24:57.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:24:57.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:24:57.641 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:24:57.642 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:24:57.642 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:24:57.643 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:24:57.647 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:1a:58:3d:92:36:38:26:fc:33:10:bb:11:20:27:2d:9f:a0:fe:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:26:54.034 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:26:54.035 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:26:54.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:26:54.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:26:54.038 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:26:54.038 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:26:54.039 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:26:54.039 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:26:54.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:26:54.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:26:54.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:26:54.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:26:54.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:26:54.046 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:26:54.173 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:26:54.174 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:26:54.175 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:26:54.175 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:26:54.176 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:26:54.177 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:26:54.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:26:54.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:26:54.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:26:54.179 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:26:54.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:26:54.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:26:54.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:26:54.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:26:54.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:26:54.182 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:26:54.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 99c3a63611cf1c9882a742812c217f207679f733edd4e7811b8cfc82528041a09b95f11c0ff34e32e35ebde1184b12401368f625739b994c64c86be7fcc1ceb50ef1d6afdc44109b85439c72606843c0f6e35317190b50a9542e6afbf124ff548f9bb99cb75106f0239b1174168236a224b614696388569ad336626cbbf2080580979f7a66b37015f8b84f22b5c56f2877534275af75d530cc98c57936e7ba807b9535b36b053dc2f305e282f79d1f9bd0b1bfca34bcdc47785a46186ce0540efa444c3d5964c7fe8157370c3ef9659b26afe322cab23934d12a74f8408552ae5ce09d9ef4bf2e614fa787a4f0ac934b2206a61e4292194366472da10c4db999b14ccff2d818c431f570c85d0eec27e65da9a16b218b99ee3e35c4ab0a6a8d83957bca735ba7e9b53e25ce7a61430e5e6600344f2efa52dac50d6d90de01fa0906bd284e6a934436d5add3ed4d8cabcb34287317cf9dc795c88c359bd95024abc20240cf97b022b96a9d88eb1932549f489c4229fd7ad860c67a201e5db1a585 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:8a:00:6c:dd:4c:86:65:05:b4:09:e8:cf:26:60:f2:e1:d4:0c:8c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:33:31.580 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:33:31.583 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:33:31.587 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:33:31.588 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:33:31.588 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:33:31.589 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:33:31.589 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:33:31.590 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:33:31.590 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:33:31.591 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:33:31.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:33:31.601 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:33:31.601 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:33:31.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:33:31.766 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:33:31.766 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:33:31.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:33:31.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:33:31.769 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:33:31.769 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:33:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:33:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:33:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:33:31.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:33:31.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:33:31.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:33:31.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:33:31.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:33:31.774 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:33:31.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:33:31.778 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:0e:88:70:51:41:9e:8d:61:87:7f:0e:3f:da:67:5c:11:86:5b:0b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:37:57.390 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:37:57.391 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:37:57.393 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:37:57.393 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:37:57.394 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-01 06:37:57.394 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:37:57.395 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:37:57.395 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:37:57.395 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:37:57.396 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:37:57.399 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:37:57.400 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:37:57.400 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:37:57.401 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:37:57.531 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:37:57.532 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:37:57.532 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:37:57.532 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:37:57.534 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:37:57.534 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:37:57.534 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:37:57.534 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:37:57.535 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:37:57.535 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:37:57.535 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:37:57.536 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:37:57.536 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:37:57.537 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:37:57.539 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:37:57.539 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:37:57.542 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 99c3a63611cf1c9882a742812c217f207679f733edd4e7811b8cfc82528041a09b95f11c0ff34e32e35ebde1184b12401368f625739b994c64c86be7fcc1ceb50ef1d6afdc44109b85439c72606843c0f6e35317190b50a9542e6afbf124ff548f9bb99cb75106f0239b1174168236a224b614696388569ad336626cbbf2080580979f7a66b37015f8b84f22b5c56f2877534275af75d530cc98c57936e7ba807b9535b36b053dc2f305e282f79d1f9bd0b1bfca34bcdc47785a46186ce0540efa444c3d5964c7fe8157370c3ef9659b26afe322cab23934d12a74f8408552ae5ce09d9ef4bf2e614fa787a4f0ac934b2206a61e4292194366472da10c4db999b14ccff2d818c431f570c85d0eec27e65da9a16b218b99ee3e35c4ab0a6a8d83957bca735ba7e9b53e25ce7a61430e5e6600344f2efa52dac50d6d90de01fa0906bd284e6a934436d5add3ed4d8cabcb34287317cf9dc795c88c359bd95024abc20240cf97b022b96a9d88eb1932549f489c4229fd7ad860c67a201e5db1a585 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:27:67:32:95:bf:42:1b:20:5e:85:e1:97:da:72:c3:57:5c:ed:f3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:44:35.321 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:44:35.323 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:44:35.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-01 06:44:35.327 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:44:35.327 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-01 06:44:35.328 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:44:35.328 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:44:35.329 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:44:35.329 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:44:35.330 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:44:35.335 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:44:35.335 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:44:35.336 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:44:35.336 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:44:35.546 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:44:35.547 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:44:35.547 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:44:35.548 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:44:35.549 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:44:35.550 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:44:35.551 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:44:35.551 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:44:35.551 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:44:35.553 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:44:35.553 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:44:35.554 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:44:35.554 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:44:35.555 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:44:35.555 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:44:35.556 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:44:35.560 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:48:76:81:5b:59:c2:05:1e:0d:72:3f:ef:d9:54:99:0f:f7:60:a7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:50:04.218 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:50:04.220 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:50:04.221 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-01 06:50:04.222 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:50:04.222 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-01 06:50:04.223 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:50:04.224 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:50:04.224 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:50:04.225 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:50:04.225 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:50:04.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:50:04.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:50:04.230 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:50:04.230 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:50:04.376 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:50:04.380 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:50:04.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:50:04.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:50:04.383 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:50:04.384 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:50:04.384 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:50:04.385 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:50:04.385 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:50:04.386 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:50:04.386 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:50:04.387 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:50:04.387 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:50:04.388 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:50:04.388 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:50:04.389 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:50:04.392 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:ec:af:ba:d1:9f:d5:24:35:67:0a:c6:ff:ca:04:77:42:10:0a:0b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 06:50:23.035 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 06:50:23.036 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 06:50:23.037 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-01 06:50:23.038 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 06:50:23.038 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-01 06:50:23.039 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 06:50:23.039 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 06:50:23.040 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 06:50:23.040 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 06:50:23.040 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 06:50:23.044 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 06:50:23.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:50:23.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 06:50:23.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:50:23.152 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 06:50:23.153 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 06:50:23.153 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 06:50:23.154 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 06:50:23.155 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 06:50:23.155 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 06:50:23.156 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:50:23.156 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:50:23.156 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:50:23.157 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:50:23.157 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:50:23.157 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:50:23.158 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 06:50:23.158 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 06:50:23.159 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 06:50:23.159 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 06:50:23.162 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 99c3a63611cf1c9882a742812c217f207679f733edd4e7811b8cfc82528041a09b95f11c0ff34e32e35ebde1184b12401368f625739b994c64c86be7fcc1ceb50ef1d6afdc44109b85439c72606843c0f6e35317190b50a9542e6afbf124ff548f9bb99cb75106f0239b1174168236a224b614696388569ad336626cbbf2080580979f7a66b37015f8b84f22b5c56f2877534275af75d530cc98c57936e7ba807b9535b36b053dc2f305e282f79d1f9bd0b1bfca34bcdc47785a46186ce0540efa444c3d5964c7fe8157370c3ef9659b26afe322cab23934d12a74f8408552ae5ce09d9ef4bf2e614fa787a4f0ac934b2206a61e4292194366472da10c4db999b14ccff2d818c431f570c85d0eec27e65da9a16b218b99ee3e35c4ab0a6a8d83957bca735ba7e9b53e25ce7a61430e5e6600344f2efa52dac50d6d90de01fa0906bd284e6a934436d5add3ed4d8cabcb34287317cf9dc795c88c359bd95024abc20240cf97b022b96a9d88eb1932549f489c4229fd7ad860c67a201e5db1a585 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:a9:e7:41:e2:fa:7b:b2:2e:38:a4:0f:02:fe:1d:bb:25:35:fd:64],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 07:08:52.395 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 07:08:52.398 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 07:08:52.401 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-01 07:08:52.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 07:08:52.402 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-01 07:08:52.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 07:08:52.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 07:08:52.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 07:08:52.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 07:08:52.405 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 07:08:52.409 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 07:08:52.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 07:08:52.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 07:08:52.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 07:08:52.580 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 07:08:52.581 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 07:08:52.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 07:08:52.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 07:08:52.584 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 07:08:52.584 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 07:08:52.584 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 07:08:52.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 07:08:52.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 07:08:52.586 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 07:08:52.586 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 07:08:52.587 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 07:08:52.588 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 07:08:52.588 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 07:08:52.588 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 07:08:52.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 07:08:52.594 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:ec:c0:c1:89:12:93:a0:d9:6c:f7:c0:6c:4f:87:04:ab:74:1c:c0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-01 07:08:59.477 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-01 07:08:59.478 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-01 07:08:59.479 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-01 07:08:59.480 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-01 07:08:59.480 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-01 07:08:59.481 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-01 07:08:59.481 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-01 07:08:59.482 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-01 07:08:59.482 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-01 07:08:59.483 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-01 07:08:59.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-01 07:08:59.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 07:08:59.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-01 07:08:59.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 07:08:59.652 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-01 07:08:59.652 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-01 07:08:59.653 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-01 07:08:59.653 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-01 07:08:59.655 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-01 07:08:59.655 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-01 07:08:59.656 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 07:08:59.656 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 07:08:59.657 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 07:08:59.657 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 07:08:59.658 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 07:08:59.658 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 07:08:59.659 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-01 07:08:59.659 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-01 07:08:59.659 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-01 07:08:59.660 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-01 07:08:59.663 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496604494871347744946626064443322472678990425553 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 01 05:02:12 UTC 2022 Final Date: Sun Oct 31 05:02:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:c5:92:c8:ac:96:fd:1d:a7:b1:50:43:51:5c:f6:60:4a:c1:3b:f2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1473fa7f6b99f3c3124c226b6680e76b5cf13a92 0ef0fbe18d7f60dce6f07153429ca4dcb51bc1e7 a7c593d1eefc960bea20d02e7e3872cc5b19e005 b46f5c570dabea312996138ceb0616367e99f1d8 6703b1a5abec4fd93aee79e1832b6adb96347392 4453aeaa83830411900b3a7faa54efc79691d3b9 519e0dcd296c83ab9e9f97aaa2c9f0f23148e051 4b6ec76357b0d50b985bef4a4b215936c5c5f013 2ce9de3bd70e38b2c5774929923c6b4575e7f75f 8530bb8a6ce00b0f660a46a937d281a91871e69f 8f92c50f91ab5db28cba1fc79f9fd26155839956 7157156604bd1f201dcf367ba3ef7f798e76fd20 24d374a3c4bbedda51ba4733683b418224ba9fa5 2514812f6d604a430d5b9f24e91776fa5e59ae68 1391f4f57cd6625838301f4e14d422ed829a8290 31b556e3ab21a95ec129ab31e030bcdfc0e1b2fd fff8bee50ecd73a6dde832ee06e80f30d16f4fbc 042672e4af5dd206084ea242275c878992504ff2 12d2388aae23415ef3eaff8968fdbd61bb004ff1 81f0b806 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:95:26:b8:d1:3c:da:78:de:30:68:60:d8:8c:8b:6f:00:95:d3:5f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]