By type
2023-01-01 05:10:15,109 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-01 05:10:15,921 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-01 05:10:16.558 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 01, 2023 5:10:18 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 01, 2023 5:10:18 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 01, 2023 5:10:18 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 01, 2023 5:10:18 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-01 05:10:18.808 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-01 05:10:19.082 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-01 05:10:19.245 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-01 05:10:19.943 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-01 05:10:19.946 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-01 05:10:19.947 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-01 05:10:19.950 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-01 05:10:19.990 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-01 05:10:19.993 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-01 05:10:20.111 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-01 05:10:20.798 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 01, 2023 5:10:21 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-01 05:10:21.651 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.338 seconds (JVM running for 9.004) Jan 01, 2023 5:10:42 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-01 05:11:12.891 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 05:11:12.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 05:11:12.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-01 05:11:12.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 05:11:12.950 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-01 05:11:12.953 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 05:11:12.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 05:11:12.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 05:11:12.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 05:11:12.960 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 05:11:12.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 05:11:12.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 05:11:13.018 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 05:11:13.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 05:11:13.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 05:11:13.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 05:11:13.799 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 05:11:13.801 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 05:11:13.802 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 05:11:13.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 05:11:13.811 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 05:11:13.812 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 05:11:13.813 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 05:11:13.813 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 05:11:13.814 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 05:11:13.830 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 05:11:13.830 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 05:11:13.830 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 05:11:13.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 05:11:13.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 05:11:13.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 05:11:13.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 05:11:13.876 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:c0:64:1a:af:87:28:d1:3c:a8:ef:18:c4:1c:74:46:04:6b:e6:c6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 06:44:28.260 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 06:44:28.264 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 06:44:28.268 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 06:44:28.268 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 06:44:28.274 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 06:44:28.277 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 06:44:28.278 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 06:44:28.278 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 06:44:28.280 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 06:44:28.280 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 06:44:28.288 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 06:44:28.289 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:44:28.289 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:44:28.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:44:28.564 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 06:44:28.565 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 06:44:28.566 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 06:44:28.566 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:44:28.569 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 06:44:28.570 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 06:44:28.570 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:44:28.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:44:28.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:44:28.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:44:28.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:44:28.573 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:44:28.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:44:28.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:44:28.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:44:28.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 06:44:28.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:5a:27:53:da:8b:19:9a:31:f0:ca:a6:38:0a:81:e7:6d:f2:96:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 06:46:14.914 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 06:46:14.916 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 06:46:14.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-01 06:46:14.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 06:46:14.919 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-01 06:46:14.919 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 06:46:14.920 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 06:46:14.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 06:46:14.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 06:46:14.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 06:46:14.926 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 06:46:14.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:46:14.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:46:14.928 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:46:15.207 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 06:46:15.208 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 06:46:15.208 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 06:46:15.208 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:46:15.210 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 06:46:15.211 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 06:46:15.211 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:46:15.212 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:46:15.212 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:46:15.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:46:15.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:46:15.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:46:15.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:46:15.215 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:46:15.215 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:46:15.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 06:46:15.222 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: c55acd42a4df9f946668d6ccba0a80579afa46709c405895e98d91227cfb4fd8bdf9b9e8cbd822295902ddc00bda6649307d83f481a484be40627c0811062e2fe56638b8a7e69c851b661ae16f1e43cbf2eba2d1f71e601f6c25ecfec54afa0f0454f48f60ff6b05c3bc46537396a4522a753efe8a20f2e2287d1d9b9a6df40c5eb4b4d7c83967b69865830379e89060614dff633ee5c75d2ec77bfee26d9a15bc4b46e6ae0187049a22605642e0ad589c12e473877549249e83772c10cca9fd93919cae7550592eaf6665d1ba28f7f75e996ba0117ae5bfc1e358350cbd138836aafc17558769f0ededdd834dc4036b429576b5ffed9076946934f12012c95988266c25a19ed3fcc04ba31e260f3c6a5d5a0cc06defed462211ac6dc74f8ddb8d2cc45ef8238b4ef1fecd5bc555d479ec592fe0c739dba149e624e667970c4172e1d7d045712c16a4241bc9d2cba0093109e2d5d79056f3782ffc3b4a941a94c7774266257063fcfab6b4cc3fa0ac8a02ba9c89a977776bc27d17bea2b299e3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:54:69:37:10:ba:8f:19:11:24:a0:c5:3c:7e:2e:3c:87:d5:24:64],[56:66:d1:a4] modulus: c849ea8d8c987ee6d9d4758a2a302f9a28bb95952fc44f3d0062ba30c23ada4680d54866f6d92074c1bba9e6fe9f8d8a41c667ac1b35dbdcbf9639b14c76078a11a8051587bd5bb5e9737dc211da30661a3eaa67050afc9a578178c0879c91b20087f9422152a091a8f67a394de3767c0ee43bad6193336ef91db91e439242edb886653b1ed2a7459c5ac80d73b223734897b9fa9fab7936a7d6c86647c9a21def7fee5d6886b642ed1b7abe48e61a26a9f7457adf09d19cb2054b3c4ff7b0ec6ba657f0d405ac0b0556ad70aa85a3e8eb8ef6f2cc67c697d50cf3d587594e7f4990b397fbeeff79b71e95972ef007db3fc989a69c03ceecd9302fed0f4e4ebb public exponent: 10001 ] 2023-01-01 06:48:31.706 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 06:48:31.709 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 06:48:31.711 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-01 06:48:31.712 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 06:48:31.713 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-01 06:48:31.714 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 06:48:31.714 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 06:48:31.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 06:48:31.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 06:48:31.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 06:48:31.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 06:48:31.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:48:31.721 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:48:31.721 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:48:31.871 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 06:48:31.872 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 06:48:31.872 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 06:48:31.873 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:48:31.875 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 06:48:31.875 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 06:48:31.876 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:48:31.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:48:31.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:48:31.878 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:48:31.878 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:48:31.879 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:48:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:48:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:48:31.881 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:48:31.882 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 06:48:31.888 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:90:93:d4:c4:af:51:31:0f:f6:d3:4b:1d:8a:3e:c2:00:a6:47:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 06:51:56.212 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 06:51:56.214 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 06:51:56.216 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 06:51:56.217 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 06:51:56.217 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 06:51:56.218 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 06:51:56.219 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 06:51:56.221 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 06:51:56.222 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 06:51:56.222 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 06:51:56.226 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 06:51:56.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:51:56.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 06:51:56.228 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:51:56.460 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 06:51:56.461 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 06:51:56.461 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 06:51:56.462 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 06:51:56.464 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 06:51:56.465 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 06:51:56.467 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:51:56.467 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:51:56.468 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:51:56.471 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:51:56.472 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:51:56.475 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:51:56.480 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 06:51:56.481 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 06:51:56.482 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 06:51:56.483 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 06:51:56.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: c55acd42a4df9f946668d6ccba0a80579afa46709c405895e98d91227cfb4fd8bdf9b9e8cbd822295902ddc00bda6649307d83f481a484be40627c0811062e2fe56638b8a7e69c851b661ae16f1e43cbf2eba2d1f71e601f6c25ecfec54afa0f0454f48f60ff6b05c3bc46537396a4522a753efe8a20f2e2287d1d9b9a6df40c5eb4b4d7c83967b69865830379e89060614dff633ee5c75d2ec77bfee26d9a15bc4b46e6ae0187049a22605642e0ad589c12e473877549249e83772c10cca9fd93919cae7550592eaf6665d1ba28f7f75e996ba0117ae5bfc1e358350cbd138836aafc17558769f0ededdd834dc4036b429576b5ffed9076946934f12012c95988266c25a19ed3fcc04ba31e260f3c6a5d5a0cc06defed462211ac6dc74f8ddb8d2cc45ef8238b4ef1fecd5bc555d479ec592fe0c739dba149e624e667970c4172e1d7d045712c16a4241bc9d2cba0093109e2d5d79056f3782ffc3b4a941a94c7774266257063fcfab6b4cc3fa0ac8a02ba9c89a977776bc27d17bea2b299e3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:6a:46:12:35:63:f4:94:ec:27:e0:7d:0c:4a:c4:03:20:b7:1f:d5],[56:66:d1:a4] modulus: d7dfd62f89a2b77e61e5556039b63c0444f5eb486cd483c4bc8992aa70f69cdfa343fc7b7949b2610d88f8cdd6600115bfa9dc0c1e81dff2b84b45339fdd490619ed22fdd25d73ccc0a0dba167195b0e7d54ec6e4bc5377f68f5d0c5baa54686b288ca233d8a9221c0d2e0cf958eb74c5e01cd68d0edd1a7146c5102a3dcc1fb5ca0a4d5c53529bb0138464d41425872ca7115fb4f7683dfa03a6c4d1a740768009cd785b37e7cb39235c6b572a940253775d1cdb9437cbe334cae6a13b5f1b3db11ccfe6a1e8af8914b948c3ad9a07dcef544d382d66b637a22cdd0dc6e95fe68f6636a2bb6f947c320ee6d6c2b58ab52e788cf0539c58e086a1be8c4531e13 public exponent: 10001 ] 2023-01-01 07:00:13.430 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:00:13.432 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:00:13.433 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:00:13.434 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:00:13.435 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:00:13.436 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:00:13.436 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:00:13.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:00:13.437 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:00:13.437 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:00:13.441 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:00:13.442 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:00:13.442 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:00:13.443 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:00:13.675 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:00:13.676 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:00:13.676 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:00:13.677 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:00:13.678 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:00:13.678 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:00:13.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:00:13.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:00:13.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:00:13.680 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:00:13.680 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:00:13.680 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:00:13.681 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:00:13.681 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:00:13.681 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:00:13.682 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:00:13.684 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:da:70:9e:4b:23:64:c1:b2:a9:93:3d:df:74:d0:57:da:91:76:f9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 07:06:57.618 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:06:57.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:06:57.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:06:57.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:06:57.628 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:06:57.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:06:57.630 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:06:57.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:06:57.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:06:57.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:06:57.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:06:57.637 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:06:57.637 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:06:57.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:06:57.908 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:06:57.909 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:06:57.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:06:57.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:06:57.911 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:06:57.911 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:06:57.912 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:06:57.912 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:06:57.912 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:06:57.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:06:57.914 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:06:57.914 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:06:57.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:06:57.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:06:57.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:06:57.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:06:57.920 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: c55acd42a4df9f946668d6ccba0a80579afa46709c405895e98d91227cfb4fd8bdf9b9e8cbd822295902ddc00bda6649307d83f481a484be40627c0811062e2fe56638b8a7e69c851b661ae16f1e43cbf2eba2d1f71e601f6c25ecfec54afa0f0454f48f60ff6b05c3bc46537396a4522a753efe8a20f2e2287d1d9b9a6df40c5eb4b4d7c83967b69865830379e89060614dff633ee5c75d2ec77bfee26d9a15bc4b46e6ae0187049a22605642e0ad589c12e473877549249e83772c10cca9fd93919cae7550592eaf6665d1ba28f7f75e996ba0117ae5bfc1e358350cbd138836aafc17558769f0ededdd834dc4036b429576b5ffed9076946934f12012c95988266c25a19ed3fcc04ba31e260f3c6a5d5a0cc06defed462211ac6dc74f8ddb8d2cc45ef8238b4ef1fecd5bc555d479ec592fe0c739dba149e624e667970c4172e1d7d045712c16a4241bc9d2cba0093109e2d5d79056f3782ffc3b4a941a94c7774266257063fcfab6b4cc3fa0ac8a02ba9c89a977776bc27d17bea2b299e3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:1d:e3:27:f3:70:8d:7d:8c:f5:d9:16:0e:3d:fe:b0:ce:ca:89:45],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 07:14:13.795 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:14:13.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:14:13.800 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:14:13.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:14:13.802 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:14:13.803 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:14:13.803 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:14:13.804 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:14:13.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:14:13.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:14:13.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:14:13.810 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:14:13.810 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:14:13.810 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:14:14.038 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:14:14.038 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:14:14.039 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:14:14.039 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:14:14.040 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:14:14.040 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:14:14.041 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:14:14.041 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:14:14.041 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:14:14.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:14:14.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:14:14.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:14:14.043 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:14:14.043 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:14:14.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:14:14.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:14:14.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: c55acd42a4df9f946668d6ccba0a80579afa46709c405895e98d91227cfb4fd8bdf9b9e8cbd822295902ddc00bda6649307d83f481a484be40627c0811062e2fe56638b8a7e69c851b661ae16f1e43cbf2eba2d1f71e601f6c25ecfec54afa0f0454f48f60ff6b05c3bc46537396a4522a753efe8a20f2e2287d1d9b9a6df40c5eb4b4d7c83967b69865830379e89060614dff633ee5c75d2ec77bfee26d9a15bc4b46e6ae0187049a22605642e0ad589c12e473877549249e83772c10cca9fd93919cae7550592eaf6665d1ba28f7f75e996ba0117ae5bfc1e358350cbd138836aafc17558769f0ededdd834dc4036b429576b5ffed9076946934f12012c95988266c25a19ed3fcc04ba31e260f3c6a5d5a0cc06defed462211ac6dc74f8ddb8d2cc45ef8238b4ef1fecd5bc555d479ec592fe0c739dba149e624e667970c4172e1d7d045712c16a4241bc9d2cba0093109e2d5d79056f3782ffc3b4a941a94c7774266257063fcfab6b4cc3fa0ac8a02ba9c89a977776bc27d17bea2b299e3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:96:13:4f:e4:88:2e:fa:c5:45:18:ba:05:d3:5f:34:1d:46:bd:a1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 07:20:43.839 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:20:43.843 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:20:43.846 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:20:43.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:20:43.847 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-01 07:20:43.848 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:20:43.848 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:20:43.848 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:20:43.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:20:43.850 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:20:43.854 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:20:43.855 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:20:43.855 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:20:43.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:20:44.074 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:20:44.074 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:20:44.074 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:20:44.075 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:20:44.076 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:20:44.076 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:20:44.076 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:20:44.077 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:20:44.077 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:20:44.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:20:44.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:20:44.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:20:44.079 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:20:44.079 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:20:44.079 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:20:44.080 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:20:44.083 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:ca:bf:ce:24:6a:e1:ff:d1:e7:f0:39:18:0c:c9:9c:d0:e6:f2:a9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 07:30:42.251 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:30:42.253 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:30:42.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-01 07:30:42.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:30:42.257 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-01 07:30:42.257 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:30:42.258 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:30:42.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:30:42.261 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:30:42.261 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:30:42.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:30:42.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:30:42.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:30:42.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:30:42.531 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:30:42.532 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:30:42.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:30:42.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:30:42.535 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:30:42.535 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:30:42.536 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:30:42.536 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:30:42.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:30:42.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:30:42.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:30:42.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:30:42.539 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:30:42.540 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:30:42.540 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:30:42.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:30:42.546 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:20:5f:cd:92:ed:08:c9:87:8a:32:0c:02:4b:f6:50:44:87:af:2f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 07:37:31.888 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:37:31.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:37:31.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-01 07:37:31.892 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:37:31.892 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-01 07:37:31.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:37:31.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:37:31.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:37:31.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:37:31.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:37:31.898 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:37:31.899 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:37:31.899 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:37:31.899 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:37:32.098 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:37:32.099 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:37:32.099 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:37:32.099 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:37:32.101 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:37:32.101 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:37:32.102 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:37:32.102 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:37:32.103 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:37:32.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:37:32.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:37:32.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:37:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:37:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:37:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:37:32.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:37:32.125 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:75:fa:bb:d8:d1:e4:68:02:44:a5:8e:0e:fc:93:b0:a2:6a:c7:c6],[56:66:d1:a4] modulus: c66437ca8333a07704bf66384f30e570027f80f748271dc6f3a92b49379a5135437cb35f2ad61e6f5cbdb919d2148629fbee9cbef70489f6aa6601cbda4d0f2d377b08e960f11ad760fd0abf89d0b6f3d5a005257d8ca77e807e859c2c4d23555db77b821312df704174a70c0b1c6fecb384b5260de42674aa178b59bcf66fdf18aaaad4195f5260a4a375c874fa70f70bab702c1ca204de95457e559015f73da94529c22f4e80fc0d760930bb5f62a0e7cd4f9e70c6b45267ccfc84f08f116c4c8858426053bc5bf537a60afd3d6214d2c38717a739f4a2fc64c7f565261ff03d19afe48d9ceda6080446c732d09ad5c40817e3899f28467bd2c04717c700c1 public exponent: 10001 ] 2023-01-01 07:37:49.052 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 07:37:49.053 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 07:37:49.054 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-01 07:37:49.055 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 07:37:49.056 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-01 07:37:49.056 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 07:37:49.057 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 07:37:49.058 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 07:37:49.058 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 07:37:49.059 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 07:37:49.063 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 07:37:49.064 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:37:49.064 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 07:37:49.064 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:37:49.236 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 07:37:49.237 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 07:37:49.237 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 07:37:49.238 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 07:37:49.239 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 07:37:49.239 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 07:37:49.239 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:37:49.240 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:37:49.240 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:37:49.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:37:49.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:37:49.241 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:37:49.242 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 07:37:49.242 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 07:37:49.243 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 07:37:49.244 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 07:37:49.247 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:97:34:e4:83:97:27:a3:1a:d6:96:33:b6:da:fd:2d:67:ec:39:7f],[56:66:d1:a4] modulus: b4a868bfe457ddc008ee764df6aaf8db1c0ae7f5b44f7ede78f0b4e2cb283a7bed6c8a13e067b7dba9d21b643b099de1ef2499c46d1d44e7191f624418eab46c4aa2259922e65a85b4aa260c0659d3e9972d61a08cbb1203070bda14ea3380eecc4a1ba0b0446eb54558f8556ce4fdcd3f1038cd84bb5d6fefb55f625f51ad4947e1b2cbb338019e4d1cb24cb2a00703bca2c155d23c4c865a74afdfb3a2055a5f814e686b38ea600e760eedb56295c6a1959f3ff4cc65240d8bac52eec2f6164c9866698e15ebbd2e5eeed1a91b4895c043ac5ab25dd7c048b967b963446da3a62d17b52cc2517fc7d6aebb17ea30a7f8d98184e8f7cef7fb4dd251858bcbcf public exponent: 10001 ] 2023-01-01 08:04:14.045 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 08:04:14.049 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 08:04:14.052 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-01 08:04:14.053 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 08:04:14.054 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-01 08:04:14.054 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 08:04:14.054 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 08:04:14.055 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 08:04:14.055 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 08:04:14.056 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 08:04:14.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 08:04:14.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 08:04:14.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 08:04:14.065 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 08:04:14.225 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 08:04:14.226 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 08:04:14.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 08:04:14.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 08:04:14.229 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 08:04:14.230 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 08:04:14.230 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 08:04:14.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 08:04:14.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 08:04:14.232 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 08:04:14.232 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 08:04:14.233 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 08:04:14.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 08:04:14.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 08:04:14.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 08:04:14.235 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 08:04:14.240 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: c55acd42a4df9f946668d6ccba0a80579afa46709c405895e98d91227cfb4fd8bdf9b9e8cbd822295902ddc00bda6649307d83f481a484be40627c0811062e2fe56638b8a7e69c851b661ae16f1e43cbf2eba2d1f71e601f6c25ecfec54afa0f0454f48f60ff6b05c3bc46537396a4522a753efe8a20f2e2287d1d9b9a6df40c5eb4b4d7c83967b69865830379e89060614dff633ee5c75d2ec77bfee26d9a15bc4b46e6ae0187049a22605642e0ad589c12e473877549249e83772c10cca9fd93919cae7550592eaf6665d1ba28f7f75e996ba0117ae5bfc1e358350cbd138836aafc17558769f0ededdd834dc4036b429576b5ffed9076946934f12012c95988266c25a19ed3fcc04ba31e260f3c6a5d5a0cc06defed462211ac6dc74f8ddb8d2cc45ef8238b4ef1fecd5bc555d479ec592fe0c739dba149e624e667970c4172e1d7d045712c16a4241bc9d2cba0093109e2d5d79056f3782ffc3b4a941a94c7774266257063fcfab6b4cc3fa0ac8a02ba9c89a977776bc27d17bea2b299e3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:93:23:62:eb:f7:de:d1:65:79:2e:30:ec:e2:2b:de:64:64:60:56],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-01 08:04:29.410 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-01 08:04:29.412 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-01 08:04:29.413 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-01 08:04:29.414 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-01 08:04:29.414 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-01 08:04:29.415 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-01 08:04:29.415 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-01 08:04:29.416 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-01 08:04:29.416 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-01 08:04:29.417 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-01 08:04:29.420 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-01 08:04:29.421 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 08:04:29.421 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-01 08:04:29.421 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 08:04:29.543 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-01 08:04:29.544 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-01 08:04:29.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-01 08:04:29.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-01 08:04:29.545 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-01 08:04:29.546 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-01 08:04:29.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 08:04:29.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 08:04:29.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 08:04:29.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 08:04:29.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 08:04:29.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 08:04:29.548 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-01 08:04:29.548 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-01 08:04:29.548 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-01 08:04:29.549 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-01 08:04:29.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 606837809337350438732585274654123330377666261722 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 01 05:06:38 UTC 2023 Final Date: Fri Dec 31 05:06:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:57:7a:33:d0:a1:29:c4:c6:8e:95:7b:e4:ca:92:22:a5:d5:4c:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa49c7aacf9a2f6eb80dd0a6587a58520aa23b92 088cbe71d4eaef3f1a6a0c46d5e4c7e79c20913c 595e49f033f6a2dc210fb5f6f32ac0b992084c66 6983d45ebd2074f8015213f20d5d0a38bd93679a 88e0f69b365f46881b3fd4f45fb96608228a832e c422229cd2f174822958f20e9d3a663e4321131b 9c71da8acba58488d589092a5f86817b8bb3ce56 5ed1a8990fe82f754d9c727e7fbd14e9c700a5de 120309bea41b1a59c9798a8043b9ab30628da972 ed4acd53c849b32ffe927c3df342457a8a6f1c34 6fc746fdaf5e5c8e8076e101953ac0569c7e88b2 7aef87c55010bd957db7b9da69d987a5068e9f46 92c5d8d4ec1b07235d03e6f2f7fec4b28ca2af5a 44dabfe279621d800404e93a4050019d0b58995a d8d09b46b08249cdf89ecc831580dc8e19a0d54a ea3b8fe46e5f7aebf8c6bb805ea4cbf40fb6b2dd 43d6553a269a0d69701290aa54a59a9b8301ebac de0b89aeb85a177ddec99fc1244ac7bb408c1113 1385af240fa1a8797ec00a5d016fcda6a018dec2 706ed8be Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:a3:96:c0:08:12:cd:99:79:e7:68:d4:6f:a3:99:2a:e5:f3:1a:b3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]