By type
2022-12-30 10:42:17,943 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-30 10:42:19,547 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-30 10:42:20.561 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 30, 2022 10:42:22 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 30, 2022 10:42:22 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 30, 2022 10:42:22 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 30, 2022 10:42:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-30 10:42:23.573 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-30 10:42:23.854 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-30 10:42:24.075 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-30 10:42:25.038 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-30 10:42:25.044 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-30 10:42:25.047 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-30 10:42:25.051 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-30 10:42:25.097 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-30 10:42:25.102 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-30 10:42:25.304 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-30 10:42:26.038 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 30, 2022 10:42:26 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-30 10:42:27.221 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.294 seconds (JVM running for 28.069) Dec 30, 2022 10:42:32 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-30 12:02:27.846 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:02:27.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:02:27.920 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:02:27.925 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:02:27.951 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:02:27.954 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:02:27.955 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:02:27.956 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:02:27.957 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:02:27.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:02:27.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:02:27.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:02:28.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:02:28.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:02:28.264 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:02:28.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:02:28.720 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:02:28.723 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:02:28.724 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:02:28.726 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:02:28.736 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:02:28.737 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:02:28.738 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:02:28.739 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:02:28.739 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:02:28.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:02:28.770 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:02:28.770 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:02:28.779 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:02:28.779 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:02:28.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:02:28.781 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:02:28.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:62:59:a8:3c:1c:75:34:cd:36:79:45:36:01:26:fc:21:cc:12:31],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 12:04:29.511 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:04:29.514 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:04:29.517 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-30 12:04:29.518 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:04:29.518 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-30 12:04:29.519 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:04:29.520 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:04:29.520 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:04:29.521 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:04:29.521 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:04:29.527 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:04:29.528 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:04:29.529 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:04:29.529 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:04:29.670 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:04:29.671 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:04:29.672 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:04:29.672 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:04:29.676 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:04:29.676 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:04:29.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:04:29.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:04:29.678 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:04:29.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:04:29.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:04:29.680 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:04:29.681 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:04:29.681 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:04:29.681 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:04:29.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:04:29.688 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:84:1f:76:4e:26:12:f0:67:06:0d:e8:8d:2a:5d:ca:53:50:4d:3b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 12:06:15.952 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:06:15.954 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:06:15.956 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-30 12:06:15.957 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:06:15.962 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-30 12:06:15.963 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:06:15.964 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:06:15.964 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:06:15.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:06:15.967 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:06:15.971 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:06:15.972 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:06:15.972 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:06:15.973 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:06:16.108 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:06:16.109 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:06:16.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:06:16.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:06:16.115 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:06:16.117 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:06:16.118 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:06:16.118 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:06:16.118 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:06:16.123 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:06:16.124 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:06:16.124 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:06:16.127 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:06:16.127 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:06:16.128 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:06:16.131 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:06:16.140 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:e0:dc:4a:c2:28:67:24:bc:94:38:24:18:43:18:a7:de:14:0e:c3],[56:66:d1:a4] modulus: ab643633544e3007eab3961171171a76f67dda16202aa9ec532063a68ac6b7e06f0e9faca4e532dd1a9995b2d70bb48c616ec98fcb8e9231b2e4f886225d369de841953019854dbc067a025499dbcebe30edede541b11924b74bb22595707774b1199c4240eb32f8d6308b9f97926ccfbb9967f18ad584c6a4df7d00bde4821f6c42b287a8a1f3bf9d526160a065d802bdc6cc08b26879b6cce31c05347bd83f7b3d945f28e4511761739506d29e090573f32a072c5e5c4022bcd5c0c9f43d826c7e40677dbb292829ae521ae9046acb0f6da920c0571bd3f9b8f7d3c32777b6fb97248ea1618ba6f05b02ad6b876d73f7a755c2070a8453a46798a74651f7b3 public exponent: 10001 ] 2022-12-30 12:08:59.136 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:08:59.137 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:08:59.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:08:59.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:08:59.141 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:08:59.142 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:08:59.143 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:08:59.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:08:59.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:08:59.145 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:08:59.150 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:08:59.151 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:08:59.151 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:08:59.152 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:08:59.287 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:08:59.288 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:08:59.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:08:59.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:08:59.291 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:08:59.292 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:08:59.292 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:08:59.293 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:08:59.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:08:59.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:08:59.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:08:59.296 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:08:59.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:08:59.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:08:59.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:08:59.299 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:08:59.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:7b:a1:7b:85:3e:6a:eb:97:aa:5b:0e:11:7d:84:c9:1c:83:74:c0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 12:15:43.401 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:15:43.405 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:15:43.408 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:15:43.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:15:43.410 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:15:43.411 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:15:43.411 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:15:43.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:15:43.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:15:43.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:15:43.418 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:15:43.419 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:15:43.419 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:15:43.420 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:15:43.581 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:15:43.582 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:15:43.583 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:15:43.583 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:15:43.584 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:15:43.585 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:15:43.585 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:15:43.585 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:15:43.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:15:43.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:15:43.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:15:43.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:15:43.589 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:15:43.589 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:15:43.589 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:15:43.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:15:43.596 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:22:37:5a:85:47:23:95:43:0d:49:56:6d:2c:03:48:3a:97:84:d1],[56:66:d1:a4] modulus: f0ad34b912fdd1f50a008b299b6891d5208b7f4bd1c97a5385445f8861c0bfcab1ead18378ca5c83771e59e211ebc132175e02c751f1701513559c813f27cb3f43d33f66ab7cf6695f2f0fec7b7e33c3bb7afe02e4252d5cf16d70c50ef4a251b35d17f1ed1bdc0306ce72663ff59b3812b709e1585923070121940d15721dab31b27cf54a65fcd70d0cbdb2877629d8d2b5e6ca0161c4fad08b90812568513e4ab387ffc5da2d5b3d32ddffeba4a7bb6d2c54783007f26ae41d229c66aec55a6c363c09f799b99daebbfece5bb7851e38d71184175f8bfda8935dae669732eb157a42eb681fa8c62e808168242c9eb375a5629f1a457d1e4ff5b09795f27e35 public exponent: 10001 ] 2022-12-30 12:20:57.712 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:20:57.718 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:20:57.735 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:20:57.736 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:20:57.737 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:20:57.737 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:20:57.738 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:20:57.739 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:20:57.740 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:20:57.740 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:20:57.756 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:20:57.769 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:20:57.770 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:20:57.771 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:20:57.899 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:20:57.901 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:20:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:20:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:20:57.904 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:20:57.904 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:20:57.905 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:20:57.905 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:20:57.907 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:20:57.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:20:57.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:20:57.909 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:20:57.910 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:20:57.910 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:20:57.910 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:20:57.911 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:20:57.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: a9ce099c59be0b2e7ef91705ba1a8dc67a92a980f743fc5ec237ff82cca12f613ac6ff91b5371376b11b0edb9cbd1fe5ee4a30f00f65667b92f311f3afab6174c66e9d83be0bb4af1fc2cf179c27d54ba1ba0c06d9cb1d69b34acac3455f31bce153b2f489fabfcef6da95fa1a2389977e29997a89413c3385c4a692a62656c20789e4b6f15f1e897e9ef9863afc192351dafc47f8990a098088f4d91191d0a42d2d90a907a0fe6a80da207f0707f1d7d0ffff6cd13e4acbd9a49c1baae2e37166f83fb10c4dd8faaf4f877e0eacc67ac0a933914f209666d889817ed0e94421f1ca20196ec962944c008c3abf3111037299465750aba8868dff32fea11407aa0790c13fa20419a73c3c848f1385741c4230fa52b52066810e4c8f85c7deeb4056b5bf73317642dc8a7d8a300e05b97fe4e7f36c34a7d229312f23710b7acaccc470cf6335eab962350b929f60d86da67f63e13b395594276a816e5b88e56d3e9f5012e8aa2df9fd6a8719e058473a790f3c4b3cbbb684da1205945f800e6539 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:04:99:ea:c2:aa:54:0b:e8:52:27:be:77:11:d8:8e:68:a4:be:60],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 12:28:03.183 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:28:03.186 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:28:03.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:28:03.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:28:03.200 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:28:03.201 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:28:03.201 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:28:03.201 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:28:03.202 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:28:03.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:28:03.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:28:03.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:28:03.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:28:03.212 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:28:03.363 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:28:03.364 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:28:03.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:28:03.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:28:03.367 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:28:03.367 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:28:03.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:28:03.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:28:03.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:28:03.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:28:03.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:28:03.378 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:28:03.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:28:03.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:28:03.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:28:03.380 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:28:03.384 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:ad:07:df:32:e1:67:de:a2:d7:ee:5c:2a:d1:b7:f4:e1:e7:d7:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 12:34:00.307 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:34:00.310 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:34:00.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:34:00.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:34:00.317 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-30 12:34:00.318 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:34:00.319 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:34:00.319 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:34:00.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:34:00.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:34:00.324 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:34:00.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:34:00.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:34:00.326 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:34:00.439 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:34:00.439 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:34:00.440 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:34:00.440 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:34:00.441 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:34:00.441 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:34:00.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:34:00.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:34:00.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:34:00.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:34:00.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:34:00.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:34:00.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:34:00.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:34:00.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:34:00.446 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:34:00.449 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: a9ce099c59be0b2e7ef91705ba1a8dc67a92a980f743fc5ec237ff82cca12f613ac6ff91b5371376b11b0edb9cbd1fe5ee4a30f00f65667b92f311f3afab6174c66e9d83be0bb4af1fc2cf179c27d54ba1ba0c06d9cb1d69b34acac3455f31bce153b2f489fabfcef6da95fa1a2389977e29997a89413c3385c4a692a62656c20789e4b6f15f1e897e9ef9863afc192351dafc47f8990a098088f4d91191d0a42d2d90a907a0fe6a80da207f0707f1d7d0ffff6cd13e4acbd9a49c1baae2e37166f83fb10c4dd8faaf4f877e0eacc67ac0a933914f209666d889817ed0e94421f1ca20196ec962944c008c3abf3111037299465750aba8868dff32fea11407aa0790c13fa20419a73c3c848f1385741c4230fa52b52066810e4c8f85c7deeb4056b5bf73317642dc8a7d8a300e05b97fe4e7f36c34a7d229312f23710b7acaccc470cf6335eab962350b929f60d86da67f63e13b395594276a816e5b88e56d3e9f5012e8aa2df9fd6a8719e058473a790f3c4b3cbbb684da1205945f800e6539 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:e7:07:61:71:81:46:2c:aa:43:67:71:0c:5c:37:38:72:dd:c5:01],[56:66:d1:a4] modulus: ebf824d4df4702a9c6d3f222bef0772993f41d4fac9f5b114472af7c2ed4ceb0cc5d359c93b2f382ac7c04866a2e05043e284962279e5d76b86913d63b5f36f9dabfbd11265a7dc1b2585a181de9421af42834c7366de82a482b0b9be6fff67f54792b6d57a836223c0e028287d06446123b1bd369fa229657a4e4da7af760877c736d09b6809a7dc588213dfde6a1fcc1c48964e5f49a9d8499b50426fc27a38a1b5f18fcfbe9d3a6d21d1a575471187c4ed30680bf92265cf5b25a6824e8c4d7265da2d6a76aa35df363b038453548e9c64a4a727f8f94277aa0cbb8408a028d5c41385c9e59d59e8fca7289e2a7b766ef2c884309bc3a89f42cd85d94a095 public exponent: 10001 ] 2022-12-30 12:40:58.831 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:40:58.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:40:58.838 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-30 12:40:58.839 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:40:58.839 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-30 12:40:58.840 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:40:58.841 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:40:58.841 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:40:58.842 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:40:58.842 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:40:58.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:40:58.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:40:58.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:40:58.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:40:58.974 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:40:58.975 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:40:58.976 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:40:58.976 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:40:58.978 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:40:58.978 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:40:58.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:40:58.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:40:58.980 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:40:58.981 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:40:58.981 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:40:58.981 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:40:58.982 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:40:58.982 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:40:58.983 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:40:58.984 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:40:58.988 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:d2:b2:21:7e:c3:43:91:cc:28:d9:19:b1:e7:fa:4e:30:2d:05:5d],[56:66:d1:a4] modulus: b8942a51eca1b1286dc7890f34a2352a29b2fc5923ba88612706cf3e406c221e05816721b15b7f5e8bc3e12295dfe094167ad6fcc0a19ef6e686207d78445106f1565f5905542fa6cd14affc1a5a964378a05cdc1cd50a843832e4551cd08a9a37d2f5d237b38026eb3d05f41a7fca6c07be8eb26968c27e53f4137d2a8d917917eb4c6b6891d5f51b10261f61020194aeb990786763462f8d95fa71591472770c6a7b5be7475879748711846d49eba1549d5d2bba861bb196c0788ef269ff6cb8bbe2d02664758ad8244f3570846091233ba744c7bcf406c195f67961302ba2e404365dc87bdd87074da234cd7dea29bfe24115105b2deec700923c2de30161 public exponent: 10001 ] 2022-12-30 12:47:58.180 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:47:58.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:47:58.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-30 12:47:58.187 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:47:58.187 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-30 12:47:58.188 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:47:58.188 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:47:58.189 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:47:58.189 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:47:58.190 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:47:58.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:47:58.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:47:58.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:47:58.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:47:58.360 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:47:58.360 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:47:58.361 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:47:58.361 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:47:58.363 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:47:58.363 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:47:58.364 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:47:58.364 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:47:58.364 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:47:58.365 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:47:58.365 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:47:58.366 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:47:58.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:47:58.371 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:47:58.371 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:47:58.372 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:47:58.376 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:b4:8a:8c:2c:55:2f:64:f4:44:bc:ba:f0:fa:82:39:79:07:2a:b5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 12:48:16.824 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 12:48:16.825 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 12:48:16.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-30 12:48:16.828 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 12:48:16.828 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-30 12:48:16.830 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 12:48:16.831 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 12:48:16.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 12:48:16.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 12:48:16.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 12:48:16.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 12:48:16.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:48:16.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 12:48:16.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:48:16.951 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 12:48:16.952 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 12:48:16.953 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 12:48:16.954 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 12:48:16.956 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 12:48:16.957 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 12:48:16.958 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:48:16.958 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:48:16.959 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:48:16.961 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:48:16.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:48:16.963 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:48:16.965 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 12:48:16.965 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 12:48:16.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 12:48:16.967 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 12:48:16.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a8:d9:b0:45:90:5e:77:5d:79:a0:59:59:af:96:be:79:dd:7e:3b:46],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-30 13:11:48.083 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 13:11:48.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 13:11:48.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-30 13:11:48.091 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 13:11:48.091 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-30 13:11:48.092 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 13:11:48.092 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 13:11:48.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 13:11:48.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 13:11:48.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 13:11:48.098 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 13:11:48.099 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 13:11:48.099 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 13:11:48.099 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 13:11:48.238 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 13:11:48.238 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 13:11:48.239 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 13:11:48.239 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 13:11:48.240 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 13:11:48.241 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 13:11:48.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 13:11:48.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 13:11:48.242 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 13:11:48.242 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 13:11:48.243 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 13:11:48.243 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 13:11:48.244 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 13:11:48.244 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 13:11:48.245 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 13:11:48.245 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 13:11:48.249 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:16:0a:e3:e4:61:ea:df:87:d3:7b:14:0a:86:c1:04:de:a1:46:0c],[56:66:d1:a4] modulus: c6b4f47922c95454ac09d5e5a4a2877e2728e28538c474f4379c43ea190bf07929a2e077c2d5b94a57e23194cfacc7a4b9c5cfd6a0cbfcc07afa3af5885fcafdc1fcb1eec3fc9fef6b42a354e92c0cd824e27ae021fab1792d9b087296f61c5825d2240cafc7cedd3654889f22e1461f7db639109add551e63a7424fb8d72de9e8f12a52b4223e28b2be303f5bfee0a754342e1df05c033a6d0a4b3b615341dbd8656f2142dee7bc976308f24c650ca65fa1dea08a3ec81a3ccc88962976f3b635484a15abc235bc68a08fe80a2e99f4480e589b58c306959c3a68fadab36faf914a9b737d3287cf06159762b17b57aadb66a1cc0d45c734f8841725a8151765 public exponent: 10001 ] 2022-12-30 13:11:52.911 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-30 13:11:52.912 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-30 13:11:52.913 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-30 13:11:52.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-30 13:11:52.914 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-30 13:11:52.915 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-30 13:11:52.915 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-30 13:11:52.915 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-30 13:11:52.916 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-30 13:11:52.916 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-30 13:11:52.921 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-30 13:11:52.921 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 13:11:52.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-30 13:11:52.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 13:11:53.010 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-30 13:11:53.011 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-30 13:11:53.011 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-30 13:11:53.011 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-30 13:11:53.013 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-30 13:11:53.013 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-30 13:11:53.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 13:11:53.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 13:11:53.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 13:11:53.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 13:11:53.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 13:11:53.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 13:11:53.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-30 13:11:53.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-30 13:11:53.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-30 13:11:53.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-30 13:11:53.020 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 86933090239668993293853208337807219429292648586 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Dec 30 10:21:45 UTC 2022 Final Date: Wed Dec 29 10:21:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:6a:8c:12:75:0e:a9:6d:61:67:79:b7:d4:f2:1c:99:85:ec:82:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 12c5ad385953a947fe973f4ec6e36b02848842da c8bfe0a5645ce4dbf1f132c2bc55eb8b7530c3fd d5264f3c717b396db67d1d067b4b409d557e385e 13707529e51b0920e11436c7189afca2220e774b f6971e0a20759aec59ce3341e88926c8953145e1 ac4a0368c48be51e9ce971de9d67c8948882eed4 d87c230eadde4284115e6f0e5b26039eb1a46a2c cfbcf60c4f7325df0cceacb2ad3ca775f8f4e6b8 715230e24f915fd59a357e1398d2b4da15968b58 7f23ee92bf54f47a912b2a6485f93cc07dbbaa37 de787375084b1cecc2d4b75769b3b9a30bdd816c 465f7739fe198cde3a2dc0f7524a65c44490ab3a 3f772e3ff46a64a9e22701322a32dfa93a19d0b3 51c9ed967ddd0fffbe889bbc4a5ab5fde77e1afa 432608646321f44539db80825972b6cb1595cdb0 1f9ba5f41aebfc0c33aec1977c115044bc15a26a 7c391599651203ecc157164e55a228a578a96d91 52d618d98725edee23915d2070f901404c536748 6d016e4aa00302bc666ab4727bfface5150ea8c3 be6f1d85 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:79:f9:c9:1c:8d:74:88:6d:c3:f8:0b:13:37:34:82:13:12:d6:29],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]