By type
2022-12-04 05:03:58,212 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-04 05:04:00,399 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-04 05:04:01.881 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 04, 2022 5:04:05 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 04, 2022 5:04:05 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 04, 2022 5:04:05 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 04, 2022 5:04:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-04 05:04:06.844 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-04 05:04:07.284 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-04 05:04:07.593 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-04 05:04:08.867 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-04 05:04:08.872 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-04 05:04:08.875 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-04 05:04:08.883 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-04 05:04:08.943 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-04 05:04:08.949 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-04 05:04:09.131 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-04 05:04:10.463 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 04, 2022 5:04:12 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-04 05:04:12.730 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 16.378 seconds (JVM running for 19.87) Dec 04, 2022 5:04:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-04 05:04:49.628 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 05:04:49.635 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 05:04:49.692 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-04 05:04:49.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 05:04:49.724 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-04 05:04:49.727 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 05:04:49.728 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 05:04:49.730 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 05:04:49.730 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 05:04:49.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 05:04:49.754 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 05:04:49.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 05:04:49.835 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 05:04:49.844 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 05:04:49.845 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 05:04:49.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 05:04:50.670 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 05:04:50.674 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 05:04:50.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 05:04:50.677 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 05:04:50.699 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 05:04:50.700 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 05:04:50.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 05:04:50.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 05:04:50.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 05:04:50.727 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 05:04:50.728 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 05:04:50.729 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 05:04:50.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 05:04:50.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 05:04:50.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 05:04:50.738 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 05:04:50.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:9e:89:17:ee:64:a8:f1:2e:01:f7:c1:d9:70:b1:15:63:6a:33:db],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 06:51:35.468 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 06:51:35.473 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 06:51:35.477 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 06:51:35.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 06:51:35.480 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 06:51:35.482 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 06:51:35.493 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 06:51:35.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 06:51:35.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 06:51:35.495 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 06:51:35.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 06:51:35.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:51:35.510 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:51:35.511 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:51:35.791 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 06:51:35.792 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 06:51:35.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 06:51:35.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:51:35.796 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 06:51:35.797 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 06:51:35.797 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:51:35.798 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:51:35.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:51:35.801 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:51:35.801 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:51:35.802 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:51:35.803 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:51:35.804 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:51:35.804 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:51:35.806 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 06:51:35.812 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:31:52:af:b3:f3:44:e1:19:18:e8:3e:05:51:df:2f:c3:6d:8d:7e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 06:53:23.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 06:53:23.349 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 06:53:23.353 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-04 06:53:23.355 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 06:53:23.356 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-04 06:53:23.359 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 06:53:23.360 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 06:53:23.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 06:53:23.363 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 06:53:23.365 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 06:53:23.373 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 06:53:23.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:53:23.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:53:23.376 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:53:23.587 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 06:53:23.587 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 06:53:23.588 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 06:53:23.588 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:53:23.593 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 06:53:23.594 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 06:53:23.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:53:23.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:53:23.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:53:23.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:53:23.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:53:23.597 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:53:23.597 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:53:23.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:53:23.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:53:23.606 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 06:53:23.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:38:51:f9:6c:d1:36:26:eb:c3:1f:90:69:2e:c9:67:a7:27:31:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 06:55:23.592 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 06:55:23.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 06:55:23.600 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-04 06:55:23.603 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 06:55:23.604 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-04 06:55:23.605 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 06:55:23.606 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 06:55:23.607 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 06:55:23.608 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 06:55:23.610 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 06:55:23.619 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 06:55:23.620 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:55:23.624 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:55:23.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:55:23.813 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 06:55:23.814 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 06:55:23.814 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 06:55:23.815 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:55:23.816 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 06:55:23.817 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 06:55:23.817 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:55:23.818 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:55:23.818 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:55:23.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:55:23.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:55:23.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:55:23.820 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:55:23.820 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:55:23.821 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:55:23.822 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 06:55:23.826 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:f7:f1:95:88:f0:15:54:12:a7:07:a6:b0:46:92:51:38:81:a6:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 06:57:49.528 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 06:57:49.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 06:57:49.530 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 06:57:49.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 06:57:49.531 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 06:57:49.534 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 06:57:49.535 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 06:57:49.536 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 06:57:49.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 06:57:49.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 06:57:49.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 06:57:49.547 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:57:49.548 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 06:57:49.549 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:57:49.950 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 06:57:49.951 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 06:57:49.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 06:57:49.952 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 06:57:49.959 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 06:57:49.960 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 06:57:49.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:57:49.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:57:49.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:57:49.965 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:57:49.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:57:49.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:57:49.967 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 06:57:49.968 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 06:57:49.968 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 06:57:49.969 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 06:57:49.973 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:76:a2:a0:7e:54:3a:64:1c:c1:23:50:f5:d2:29:a0:a7:9f:af:05],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 07:04:51.622 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:04:51.635 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:04:51.637 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:04:51.643 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:04:51.644 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:04:51.645 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:04:51.646 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:04:51.649 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:04:51.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:04:51.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:04:51.664 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:04:51.666 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:04:51.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:04:51.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:04:51.866 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:04:51.867 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:04:51.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:04:51.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:04:51.871 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:04:51.871 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:04:51.872 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:04:51.872 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:04:51.873 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:04:51.874 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:04:51.874 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:04:51.875 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:04:51.876 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:04:51.876 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:04:51.877 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:04:51.878 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:04:51.883 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:7f:da:39:f9:5e:ca:ec:56:7e:74:4b:81:30:f3:61:17:db:f5:09],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 07:09:58.869 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:09:58.871 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:09:58.873 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:09:58.874 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:09:58.875 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:09:58.876 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:09:58.877 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:09:58.877 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:09:58.878 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:09:58.878 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:09:58.886 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:09:58.887 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:09:58.888 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:09:58.888 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:09:59.159 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:09:59.160 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:09:59.160 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:09:59.161 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:09:59.162 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:09:59.163 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:09:59.163 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:09:59.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:09:59.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:09:59.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:09:59.166 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:09:59.168 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:09:59.169 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:09:59.169 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:09:59.170 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:09:59.171 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:09:59.174 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:3b:ba:1d:e7:55:23:2e:de:b2:f2:b9:2e:a8:11:04:d4:6e:01:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 07:16:49.825 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:16:49.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:16:49.839 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:16:49.843 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:16:49.844 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:16:49.845 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:16:49.845 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:16:49.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:16:49.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:16:49.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:16:49.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:16:49.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:16:49.855 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:16:49.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:16:50.055 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:16:50.056 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:16:50.057 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:16:50.058 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:16:50.061 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:16:50.063 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:16:50.064 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:16:50.064 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:16:50.064 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:16:50.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:16:50.075 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:16:50.075 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:16:50.076 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:16:50.076 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:16:50.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:16:50.078 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:16:50.082 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:26:72:71:48:7f:26:1c:4b:e6:63:74:db:0d:d3:40:f9:54:1c:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 07:22:05.320 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:22:05.324 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:22:05.327 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:22:05.328 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:22:05.329 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-04 07:22:05.337 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:22:05.337 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:22:05.338 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:22:05.339 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:22:05.340 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:22:05.366 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:22:05.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:22:05.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:22:05.369 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:22:05.613 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:22:05.615 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:22:05.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:22:05.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:22:05.618 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:22:05.619 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:22:05.620 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:22:05.621 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:22:05.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:22:05.623 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:22:05.623 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:22:05.624 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:22:05.625 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:22:05.625 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:22:05.626 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:22:05.627 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:22:05.632 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: d0186d381c4013d55cf0e806f894f3f776a2c08b009de6110f2ddbbeb0285545f573bff7b894d9afbc4f5357ab23fa08af6d72980ff2389aaa09677eae8bc6ec0b43752b7f5bef3e2e9c34ecdd7dea9b91f9dfa65a3ba97e472e7f5100721e04523ff2307e7dbd848aaf86ae898f9c75975a4ff301b7b856140a4ba0c5223cef2900ea4aad6d049de98fca1d12ee1ab5ba44ba2747fee774d5c9a26fdf9abb293718fb867e53c99c489644800bd991d83575ef7d51bb3da2f846badadf8849b774b354406db3b1972359a3bdcb772cf1cd07f1bcef7a27bca6868abbad6d5dda2e7c30d8ad81f36db3335df5442efd5520c87e4e4d3a8d91d195553fad40eb7a7ead08ff8b3b333070f7a0d77ec29c566cd6e8a69ab84a0767043db200ca75c60072229a5c6af73ce5d408fd14a233d82f58aeac6607f1548a8b3a26cc507be9cf0b5efe55c28f1a1d11236eec9236a265bafc19b26f7e8c2f08d554d5e252c0746fe331b6fd7f5cf8aae51186b9a509a16003eaee3731b8693a4b8050b46d5b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:67:72:4b:a6:e9:23:a6:cd:e1:6b:cd:7e:26:ae:82:0b:3f:bc:be],[56:66:d1:a4] modulus: c1176fe49315c8203242ee942dce34c81bec86990d803f7115c33ab6e8b52f05f0fa718ccf2815611f193a5c0931afbbc547c42e486af72997e19c0e2c124292f62fee9768b182c8ca5b9ba347b0938ab9d12d6533445036fa01a2127f581d416fa499cb2aa73603dfbf4b7d416fb1cb26d74672ec02ef906f5a515921a115dc5f756fef84886467c0709a82b548dceb6f62dd3757d0b4aa4e5d3352dce134bee1bf0814554a23c08e01f30d1fa138d171f720c1aa132e2231095f581fbaf904686fe8cb4d42b839b17f4daa6707597f182c48ae1004a56668bd2cbf0d7b1c46e807f465d97966a42319e4f7cd02161360f964291623a8ed4c8273aa1db94965 public exponent: 10001 ] 2022-12-04 07:30:51.965 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:30:51.968 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:30:51.970 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-04 07:30:51.971 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:30:51.971 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-04 07:30:51.972 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:30:51.972 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:30:51.972 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:30:51.973 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:30:51.973 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:30:51.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:30:51.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:30:51.980 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:30:51.980 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:30:52.295 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:30:52.296 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:30:52.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:30:52.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:30:52.298 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:30:52.299 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:30:52.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:30:52.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:30:52.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:30:52.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:30:52.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:30:52.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:30:52.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:30:52.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:30:52.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:30:52.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:30:52.306 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:ac:0e:be:b8:0d:bb:b2:b1:c6:f7:77:db:95:a3:bb:31:44:dd:31],[56:66:d1:a4] modulus: d52051436b5a49b61db86ebe51ddf8b22b5b674519a93be9d138f8a5a42f630150923930b0de4b859f6c2c1cbcbe5b0debf73182c1753093fa285cd796d5de97d3d1c3d5f08a0ef85e448e7f57828037b98e540097a85c42727d0c121aca8f53117c2a37ef95e2578de1fc172bcce276ba88668201cb3c92113744c444534c4cb86185c67fd9e10f2009f89bf05644220b7ca278df85f064787025037c714dc718d47d6e7ca8b245e9c9cb96725ab91bcd2536d42389bfd74625bf8b8211b12dc8347fc53b29499d5460c38c44e31f49e887a6c78d8b2d65fbca339d6d72e33b655d6016c6ffc6f787382b0631cee3334232ad7593a2cbf68fa181727f62292d public exponent: 10001 ] 2022-12-04 07:38:08.295 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:38:08.298 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:38:08.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-04 07:38:08.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:38:08.301 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-04 07:38:08.302 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:38:08.303 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:38:08.303 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:38:08.304 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:38:08.304 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:38:08.308 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:38:08.310 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:38:08.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:38:08.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:38:08.620 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:38:08.621 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:38:08.622 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:38:08.622 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:38:08.624 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:38:08.625 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:38:08.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:38:08.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:38:08.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:38:08.628 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:38:08.628 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:38:08.628 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:38:08.629 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:38:08.629 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:38:08.630 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:38:08.631 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:38:08.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:f2:6c:64:ac:f4:30:2a:9c:0c:36:86:c3:e8:20:1f:7d:5f:b1:44],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 07:38:35.463 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 07:38:35.466 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 07:38:35.471 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-04 07:38:35.474 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 07:38:35.483 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-04 07:38:35.487 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 07:38:35.489 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 07:38:35.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 07:38:35.492 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 07:38:35.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 07:38:35.504 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 07:38:35.505 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:38:35.505 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 07:38:35.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:38:35.663 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 07:38:35.664 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 07:38:35.664 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 07:38:35.664 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 07:38:35.666 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 07:38:35.666 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 07:38:35.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:38:35.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:38:35.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:38:35.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:38:35.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:38:35.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:38:35.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 07:38:35.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 07:38:35.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 07:38:35.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 07:38:35.677 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:0f:c4:22:af:94:83:d7:29:ae:82:f6:98:40:14:d6:18:87:15:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 08:03:07.383 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 08:03:07.386 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 08:03:07.389 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-04 08:03:07.390 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 08:03:07.391 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-04 08:03:07.392 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 08:03:07.392 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 08:03:07.393 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 08:03:07.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 08:03:07.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 08:03:07.400 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 08:03:07.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 08:03:07.403 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 08:03:07.403 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 08:03:07.599 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 08:03:07.600 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 08:03:07.601 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 08:03:07.601 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 08:03:07.603 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 08:03:07.604 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 08:03:07.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 08:03:07.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 08:03:07.606 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 08:03:07.607 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 08:03:07.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 08:03:07.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 08:03:07.622 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 08:03:07.623 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 08:03:07.623 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 08:03:07.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 08:03:07.630 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:11:1e:a0:ff:4a:9e:61:55:6e:6a:ac:86:64:90:4b:ab:29:e3:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-04 08:03:12.923 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-04 08:03:12.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-04 08:03:12.927 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-04 08:03:12.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-04 08:03:12.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-04 08:03:12.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-04 08:03:12.930 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-04 08:03:12.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-04 08:03:12.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-04 08:03:12.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-04 08:03:12.935 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-04 08:03:12.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 08:03:12.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-04 08:03:12.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 08:03:13.051 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-04 08:03:13.052 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-04 08:03:13.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-04 08:03:13.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-04 08:03:13.053 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-04 08:03:13.054 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-04 08:03:13.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 08:03:13.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 08:03:13.055 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 08:03:13.055 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 08:03:13.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 08:03:13.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 08:03:13.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-04 08:03:13.057 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-04 08:03:13.057 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-04 08:03:13.057 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-04 08:03:13.060 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624585348943032938362737943114426151383146006062 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Dec 04 04:59:27 UTC 2022 Final Date: Fri Dec 03 04:59:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1e:34:5b:1f:50:78:07:cb:ce:19:42:0f:8a:2f:f6:ad:94:0f:ec:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7227767a064891849b4d58ebc0970d5dc6035191 caf94259548bf9999a01c5cec013429a6b1e0258 28de3439ee7f807d1fbcff4cc066eaacbf2c628b 8da43676b8a027c9f8a44cf19289c7fe2405866d 45253505146a55014d8c0118aebb7814b9f0a453 25970475e5c6343d525653d706a730cf0c4c7ebe 8ca8b2f7f5527c00f653cc1258308d788db9a16f 89aaf1315e6349f6f840167a5b8d1c031067a960 32a161a143147133a11bfb3135643f0490179974 c72bc99d23f38105393dbc06bb48241d9f0f9a1d 00d78fcb58b44e8a0b0409e4f2d962d950429704 e8f46299204ce9d63a51d328422cc87a90594820 7ef8032dc49a3b392e242201a603fd1f8099090b 5d64ef69b6c47582a4b7569882b10ae8640ad99f f6e960c83c687bcff9c5b0632d7a0459b28b17fc 0f89e378922f2d08c6087d9b59c41c60bdee63db 30d6702cae2339e7841bd4176970ab0781fd34c9 b0ef89ac69cdbe84922d64fe4f63270e50fd9704 d20061af52b7025ad1abf845e3636792fb6249a9 b235bfcd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:92:f0:d6:bf:08:d2:d0:dc:b9:0a:ac:63:33:5d:b1:63:db:37:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]