By type
2022-12-16 05:02:22,841 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-16 05:02:23,875 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-16 05:02:24.628 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 16, 2022 5:02:26 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 16, 2022 5:02:26 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 16, 2022 5:02:26 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 16, 2022 5:02:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-16 05:02:27.468 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-16 05:02:27.786 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-16 05:02:27.983 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-16 05:02:28.775 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-16 05:02:28.778 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-16 05:02:28.780 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-16 05:02:28.786 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-16 05:02:28.840 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-16 05:02:28.845 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-12-16 05:02:28.977 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-16 05:02:29.950 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 16, 2022 5:02:30 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-16 05:02:31.131 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.214 seconds (JVM running for 11.026) Dec 16, 2022 5:02:58 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-16 05:03:30.628 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 05:03:30.636 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 05:03:30.677 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-16 05:03:30.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 05:03:30.700 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-16 05:03:30.702 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 05:03:30.703 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 05:03:30.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 05:03:30.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 05:03:30.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 05:03:30.722 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 05:03:30.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 05:03:30.796 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 05:03:30.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 05:03:30.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 05:03:30.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 05:03:31.525 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 05:03:31.528 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 05:03:31.529 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 05:03:31.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 05:03:31.540 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 05:03:31.541 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 05:03:31.542 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 05:03:31.542 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 05:03:31.543 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 05:03:31.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 05:03:31.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 05:03:31.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 05:03:31.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 05:03:31.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 05:03:31.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 05:03:31.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 05:03:31.616 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:6a:75:2e:4d:d1:61:e9:72:c0:40:a5:64:11:71:de:95:17:9f:b9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 06:40:53.356 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 06:40:53.370 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 06:40:53.379 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 06:40:53.382 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 06:40:53.383 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 06:40:53.384 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 06:40:53.386 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 06:40:53.390 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 06:40:53.392 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 06:40:53.393 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 06:40:53.400 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 06:40:53.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:40:53.408 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:40:53.410 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:40:53.692 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 06:40:53.693 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 06:40:53.693 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 06:40:53.694 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:40:53.697 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 06:40:53.697 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 06:40:53.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:40:53.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:40:53.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:40:53.703 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:40:53.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:40:53.705 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:40:53.710 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:40:53.710 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:40:53.711 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:40:53.717 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 06:40:53.729 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:ac:42:7f:7f:5d:8f:a4:70:ba:9d:e2:b0:57:c8:5b:7e:d0:c3:34],[56:66:d1:a4] modulus: cb754a29fab1437b44fa8f14152b262b02f7477e228219b8326dd90c5ec1a0ee9966e41b80e3b2bb72916f64a0c94d30afb0c0765f8cfcd0450973ce34f6e4e4f9020b1ff56800c4879d4004d61e889200290e4e20a80939c0a3fb355ef38dadd09f513f3282746c06e23c16a676dccb67f1c10070cdfa9289a6ff1ac4b17d0dc5796013a56df0b4eb054a8049fbb5b4d9e36f60bba301280bd61e541959e1dd277fffa9559b1a482e002c7deb84abb8fa3e4cfffc97f80afb40fb193764a4474007656e5e8f826c72a9f9a1879034f1cd6ff41de93b428d9465a9a67e118cbe8960ee1e11072e55ea2ae3deaf47c06fe387bfa25fffde376215e3c1bca74c79 public exponent: 10001 ] 2022-12-16 06:42:41.646 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 06:42:41.649 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 06:42:41.651 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-16 06:42:41.653 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 06:42:41.653 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-16 06:42:41.655 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 06:42:41.655 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 06:42:41.656 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 06:42:41.657 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 06:42:41.658 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 06:42:41.663 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 06:42:41.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:42:41.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:42:41.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:42:41.800 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 06:42:41.802 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 06:42:41.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 06:42:41.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:42:41.807 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 06:42:41.808 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 06:42:41.809 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:42:41.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:42:41.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:42:41.813 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:42:41.813 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:42:41.814 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:42:41.815 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:42:41.816 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:42:41.817 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:42:41.819 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 06:42:41.825 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:97:94:c3:1b:e9:62:7d:21:43:a6:2f:a3:29:22:94:6e:c9:a2:79],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 06:44:33.794 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 06:44:33.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 06:44:33.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-16 06:44:33.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 06:44:33.800 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-16 06:44:33.801 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 06:44:33.801 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 06:44:33.801 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 06:44:33.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 06:44:33.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 06:44:33.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 06:44:33.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:44:33.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:44:33.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:44:33.993 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 06:44:33.994 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 06:44:33.994 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 06:44:33.994 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:44:33.996 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 06:44:33.997 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 06:44:33.997 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:44:33.998 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:44:33.998 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:44:33.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:44:34.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:44:34.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:44:34.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:44:34.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:44:34.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:44:34.002 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 06:44:34.007 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:09:b8:c9:63:99:94:96:63:07:75:23:c3:05:b8:85:e0:c7:7d:1d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 06:47:00.050 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 06:47:00.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 06:47:00.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 06:47:00.057 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 06:47:00.058 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 06:47:00.060 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 06:47:00.065 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 06:47:00.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 06:47:00.067 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 06:47:00.068 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 06:47:00.072 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 06:47:00.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:47:00.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:47:00.075 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:47:00.400 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 06:47:00.401 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 06:47:00.402 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 06:47:00.402 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:47:00.405 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 06:47:00.405 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 06:47:00.406 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:47:00.411 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:47:00.412 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:47:00.413 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:47:00.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:47:00.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:47:00.415 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:47:00.415 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:47:00.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:47:00.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 06:47:00.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:ed:9f:72:f1:d7:3f:3f:3e:bc:a4:45:27:27:97:9e:56:fe:90:7f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 06:54:37.726 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 06:54:37.732 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 06:54:37.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 06:54:37.737 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 06:54:37.738 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 06:54:37.739 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 06:54:37.740 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 06:54:37.740 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 06:54:37.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 06:54:37.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 06:54:37.749 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 06:54:37.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:54:37.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 06:54:37.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:54:37.955 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 06:54:37.956 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 06:54:37.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 06:54:37.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 06:54:37.959 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 06:54:37.959 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 06:54:37.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:54:37.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:54:37.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:54:37.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:54:37.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:54:37.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:54:37.963 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 06:54:37.964 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 06:54:37.964 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 06:54:37.965 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 06:54:37.969 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:ea:f8:95:35:4d:52:01:b4:58:a4:16:91:07:9a:46:cb:bb:63:13],[56:66:d1:a4] modulus: d1bbb7963da308a61537f895b1b4ec01dc805093c189b2b12d4ae2de1da7548897afe3c09d6fd1ff0bab640b40d542d11bb569dcc28596f1de831da41eaf25122fab611489654db938a51bdfe0a65c557f79daacb395e1743928eaaffb0c757e128839a783b301e617c04f9529dbbeffcd95a771b62998c4ae6d2b0ac97c345aaf0918b11ef92c03301d470102f2eb985cb38118be987b409e9717f6e0c6d2aaec45104cfc92dd7131ea196252d08420311129b9e9fcfc5a2356da1f1f8953460618ce0b24c84c76ee7c3ef1fb209917dab418d80aa0e1efdc344fdd5f9c7f6812db824c3d42f3d636e1f9952d6f163494cadbd1641a1552d1e69630e9d71b6b public exponent: 10001 ] 2022-12-16 07:00:15.283 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 07:00:15.285 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 07:00:15.288 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 07:00:15.289 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 07:00:15.289 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-16 07:00:15.290 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 07:00:15.290 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 07:00:15.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 07:00:15.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 07:00:15.292 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 07:00:15.299 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 07:00:15.300 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:00:15.300 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:00:15.300 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:00:15.502 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 07:00:15.503 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 07:00:15.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 07:00:15.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:00:15.506 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 07:00:15.506 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 07:00:15.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:00:15.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:00:15.508 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:00:15.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:00:15.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:00:15.510 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:00:15.511 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:00:15.511 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:00:15.512 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:00:15.513 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 07:00:15.516 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:ef:d6:56:8b:3a:cf:23:5a:37:1d:95:27:ee:54:5d:32:15:58:a8],[56:66:d1:a4] modulus: f24f8291fe1c441a37cae81c71f1afe8211da258ab6745130522e01349d0af934d57c3de5ae3b0e0ea5b98b6b1c306efc932ba2cb0db32dc8cdc87ade6ed87f7725e6a5127289c3d42613a0635063f6f39511969ca7e9881846be09ed60bfe383932656a71dbce67e1fa1952585b8817461393bfb1b8ce34035ac97070d60333f9b8371c733b09c3da484698f111df49c238ca2c3bcaad9191af91d9462a9606f6bb2f546d028e4e7e5ecbced2c63cdec5c3e2b8b2f7fcaebe50f1098d585e898baf461fd9e53baeb31c5776abd77e0156d5183403c3e89a63076d4da303c1526cf153aa9ffa318829690b957f8a05e553870117f9008f1cd7dbe445b22d2f87 public exponent: 10001 ] 2022-12-16 07:06:45.983 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 07:06:45.987 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 07:06:45.990 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-16 07:06:45.991 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 07:06:45.992 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-16 07:06:45.993 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 07:06:45.993 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 07:06:45.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 07:06:45.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 07:06:45.995 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 07:06:45.999 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 07:06:46.004 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:06:46.005 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:06:46.005 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:06:46.210 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 07:06:46.211 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 07:06:46.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 07:06:46.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:06:46.213 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 07:06:46.214 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 07:06:46.214 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:06:46.215 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:06:46.215 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:06:46.216 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:06:46.216 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:06:46.216 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:06:46.217 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:06:46.217 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:06:46.218 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:06:46.219 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 07:06:46.222 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:07:7b:77:5b:fa:94:63:a4:ed:e3:5b:18:82:ce:bf:41:bc:a9:37],[56:66:d1:a4] modulus: ce91fb889b120eb09e0894b832d9628b5ddd606a1606b1b4964e7f582389f04d7d59968abef099131791ed5b0621b1666f62a6eccf3a140235eb34301c737be1eaaa831964c8ee7dae582295aac668dab320be7b72936db55279bf457d5fd1626189a1044d811141db27f090c6482df740d52be3a589a2b047de780d8386661c6939a34a4b8b0527b71dd33ca821f20de3421ca9a6071b712167dce9d3fded6d706fb1ff93082d53c2ffa3e6e72071865f5ee22303e915fc829dc77d827222f8904d2d66f40b1a09a0da51dcc52725eb0c2ef87c43038f1affc904bf7b707f95693a75f75431b147c84eddd557587187b79147c58769c567cee5628a62aa80c7 public exponent: 10001 ] 2022-12-16 07:12:49.649 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 07:12:49.656 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 07:12:49.660 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-16 07:12:49.662 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 07:12:49.662 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-16 07:12:49.663 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 07:12:49.663 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 07:12:49.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 07:12:49.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 07:12:49.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 07:12:49.669 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 07:12:49.670 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:12:49.670 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:12:49.671 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:12:49.857 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 07:12:49.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 07:12:49.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 07:12:49.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:12:49.860 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 07:12:49.861 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 07:12:49.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:12:49.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:12:49.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:12:49.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:12:49.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:12:49.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:12:49.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:12:49.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:12:49.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:12:49.866 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 07:12:49.870 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:ad:b2:b4:83:63:12:09:c9:a8:62:a6:cd:8e:04:33:41:5c:d9:95],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 07:13:09.068 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 07:13:09.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 07:13:09.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-16 07:13:09.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 07:13:09.072 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-16 07:13:09.072 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 07:13:09.072 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 07:13:09.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 07:13:09.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 07:13:09.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 07:13:09.077 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 07:13:09.078 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:13:09.078 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:13:09.078 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:13:09.206 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 07:13:09.207 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 07:13:09.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 07:13:09.209 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:13:09.211 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 07:13:09.212 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 07:13:09.212 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:13:09.213 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:13:09.213 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:13:09.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:13:09.216 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:13:09.216 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:13:09.217 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:13:09.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:13:09.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:13:09.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 07:13:09.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: b3c15954f8379b970a633096fd3d5f71e4fc905103d2fbd2b8019ab5bad58d9938ae53ec4f074572f0aa46244d82cf3a79885a841f39a238dbdcf2bb731843cd26aec4181f9cb125a297fb94b9624c92541a520aae37eb47cb461cc820f3136d7828c55ac1d9ec3693fc8d21e689257a5c25a9f3a7e107d32d0b6a2e620c532f556398b61ba973ef16d22469c65b756ed45b6fe3ce620f1a528c60f4a26803a774e76b72557556492043246738f7a722324b8ed7d8af3a9b19db3428e0bcbe81bf73e56501d440977a97f3fb005c7b518785e878389a65e772d12192b8a53a3d1a988f422dbf34a812873d06857718bd4abc04004b0d48aaa72efdf588784df05bf55bd3c4193494eb30d6d94fb2295979572f46aa263d9f395e14c33335ee3b71038a27632e25c08c571ffbe08b507f6bebaf611cf392a7c9b29a79897b2e24f7e1d35f7193b5ab657f3ebf8cafa77115214d96b52f7f311176bbc826650efd2b7d851057ee6657f970d9620323a4b308c427f2cd541a8d44942bc601b81c65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:d8:96:ad:54:bd:f0:5b:76:a4:13:c9:a3:03:9d:10:1d:42:0d:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 07:38:59.666 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 07:38:59.671 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 07:38:59.676 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-16 07:38:59.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 07:38:59.679 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-16 07:38:59.680 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 07:38:59.680 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 07:38:59.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 07:38:59.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 07:38:59.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 07:38:59.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 07:38:59.687 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:38:59.690 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:38:59.691 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:38:59.920 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 07:38:59.921 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 07:38:59.921 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 07:38:59.921 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:38:59.923 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 07:38:59.923 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 07:38:59.924 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:38:59.924 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:38:59.924 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:38:59.926 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:38:59.926 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:38:59.926 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:38:59.927 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:38:59.928 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:38:59.928 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:38:59.929 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 07:38:59.933 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:b4:76:b1:75:24:fa:27:7b:91:f9:21:fa:b7:24:31:3c:ca:79:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-16 07:39:07.017 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-16 07:39:07.018 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-16 07:39:07.020 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-16 07:39:07.020 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-16 07:39:07.021 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-16 07:39:07.021 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-16 07:39:07.022 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-16 07:39:07.022 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-16 07:39:07.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-16 07:39:07.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-16 07:39:07.026 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-16 07:39:07.027 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:39:07.027 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-16 07:39:07.028 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:39:07.143 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-16 07:39:07.144 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-16 07:39:07.145 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-16 07:39:07.145 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-16 07:39:07.146 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-16 07:39:07.147 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-16 07:39:07.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:39:07.148 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:39:07.148 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:39:07.149 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:39:07.149 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:39:07.149 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:39:07.150 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-16 07:39:07.150 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-16 07:39:07.151 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-16 07:39:07.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-16 07:39:07.154 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 46703649669327132501550229443406753336017401537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 16 04:59:54 UTC 2022 Final Date: Wed Dec 15 04:59:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4] modulus: b3c15954f8379b970a633096fd3d5f71e4fc905103d2fbd2b8019ab5bad58d9938ae53ec4f074572f0aa46244d82cf3a79885a841f39a238dbdcf2bb731843cd26aec4181f9cb125a297fb94b9624c92541a520aae37eb47cb461cc820f3136d7828c55ac1d9ec3693fc8d21e689257a5c25a9f3a7e107d32d0b6a2e620c532f556398b61ba973ef16d22469c65b756ed45b6fe3ce620f1a528c60f4a26803a774e76b72557556492043246738f7a722324b8ed7d8af3a9b19db3428e0bcbe81bf73e56501d440977a97f3fb005c7b518785e878389a65e772d12192b8a53a3d1a988f422dbf34a812873d06857718bd4abc04004b0d48aaa72efdf588784df05bf55bd3c4193494eb30d6d94fb2295979572f46aa263d9f395e14c33335ee3b71038a27632e25c08c571ffbe08b507f6bebaf611cf392a7c9b29a79897b2e24f7e1d35f7193b5ab657f3ebf8cafa77115214d96b52f7f311176bbc826650efd2b7d851057ee6657f970d9620323a4b308c427f2cd541a8d44942bc601b81c65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e c7047dc9d2d996c87a62fd3ced689366a912bf7a 8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67 7cac537386dc139f42cc9922798db1aa872930b8 16d43f7bfda3025be58842385cf74fd80b112749 19b984ade60ac8e66d7b1f872e17e628f8cbbb19 0f69dca4809e6fb14c2d07062feb74433b5dd2af c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7 3b09877fa939c1aa1e480a033bf3bf4ec63416d5 c4055aa0e86345ec28adeb63b035786bb644ad3d f667b7e34b74e53eb2efe15bcebd3101eaf306a9 0b79b25f864b4257d5555f28865a0952d61225cd a672a8968601bd8435ced523f867237fed7fe3d5 8c800073f513ae08ed258f84b0d9b1a54257e9e9 d54d5708829e2ea4dcd58c1db51c5a19ff43c156 48d3b8e7bba36865d371a41f9a2e44c1d790f7fe 736b15fa8c34bbbb7e29b03099da45c7392f5b66 9a8727e2173b0ec4bb0dda8f0a5448783836bf35 a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc b8563aa6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:d9:bd:e2:e2:f9:e3:39:20:67:56:4d:89:f6:42:99:1c:da:8d:e4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]