By type
2023-02-01 05:30:34,634 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-02-01 05:30:36,163 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-02-01 05:30:37.365 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Feb 01, 2023 5:30:40 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Feb 01, 2023 5:30:40 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Feb 01, 2023 5:30:40 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Feb 01, 2023 5:30:40 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-02-01 05:30:41.071 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-02-01 05:30:41.515 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-02-01 05:30:41.762 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-02-01 05:30:42.819 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-02-01 05:30:42.823 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2023-02-01 05:30:42.825 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-02-01 05:30:42.831 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-02-01 05:30:42.879 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-02-01 05:30:42.884 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-02-01 05:30:43.034 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-02-01 05:30:43.936 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Feb 01, 2023 5:30:44 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-02-01 05:30:45.249 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 12.212 seconds (JVM running for 15.068) Feb 01, 2023 5:31:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-02-01 05:31:29.567 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 05:31:29.577 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 05:31:29.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-01 05:31:29.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 05:31:29.697 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-01 05:31:29.700 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 05:31:29.701 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 05:31:29.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 05:31:29.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 05:31:29.708 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 05:31:29.719 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 05:31:29.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 05:31:29.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 05:31:29.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 05:31:29.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 05:31:29.807 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 05:31:31.734 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 05:31:31.738 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 05:31:31.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 05:31:31.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 05:31:31.753 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 05:31:31.754 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 05:31:31.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 05:31:31.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 05:31:31.757 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 05:31:31.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 05:31:31.777 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 05:31:31.777 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 05:31:31.784 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 05:31:31.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 05:31:31.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 05:31:31.787 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 05:31:31.828 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:4e:40:4a:0b:da:78:a2:77:ed:cf:69:ea:be:55:3d:e2:45:46:43],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 08:40:11.055 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 08:40:11.059 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 08:40:11.063 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 08:40:11.065 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 08:40:11.065 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 08:40:11.066 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 08:40:11.067 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 08:40:11.068 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 08:40:11.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 08:40:11.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 08:40:11.076 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 08:40:11.078 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:40:11.079 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:40:11.080 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:40:13.688 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 08:40:13.689 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 08:40:13.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 08:40:13.690 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:40:13.693 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 08:40:13.693 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 08:40:13.694 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:40:13.694 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:40:13.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:40:13.696 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:40:13.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:40:13.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:40:13.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:40:13.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:40:13.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:40:13.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 08:40:13.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:85:a8:75:7d:ea:b5:3f:75:ec:83:d6:da:24:05:57:5d:aa:88:61],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 08:42:12.910 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 08:42:12.913 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 08:42:12.915 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-01 08:42:12.917 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 08:42:12.917 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-01 08:42:12.918 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 08:42:12.919 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 08:42:12.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 08:42:12.920 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 08:42:12.935 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 08:42:12.957 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 08:42:12.959 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:42:12.959 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:42:12.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:42:14.387 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 08:42:14.394 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 08:42:14.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 08:42:14.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:42:14.401 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 08:42:14.403 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 08:42:14.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:42:14.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:42:14.405 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:42:14.407 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:42:14.408 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:42:14.425 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:42:14.427 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:42:14.427 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:42:14.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:42:14.429 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 08:42:14.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:13:50:6f:fd:ac:c5:ee:bc:23:52:c6:f8:b2:f4:76:1b:dc:26:08],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 08:44:15.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 08:44:15.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 08:44:15.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-01 08:44:15.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 08:44:15.318 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-01 08:44:15.323 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 08:44:15.324 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 08:44:15.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 08:44:15.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 08:44:15.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 08:44:15.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 08:44:15.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:44:15.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:44:15.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:44:16.063 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 08:44:16.066 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 08:44:16.066 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 08:44:16.068 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:44:16.077 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 08:44:16.078 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 08:44:16.079 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:44:16.080 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:44:16.080 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:44:16.100 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:44:16.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:44:16.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:44:16.103 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:44:16.105 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:44:16.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:44:16.124 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 08:44:16.148 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:76:71:ab:5f:be:52:2a:a9:83:e1:a7:07:9c:f3:3f:66:40:e8:c5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 08:47:10.296 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 08:47:10.304 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 08:47:10.307 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 08:47:10.314 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 08:47:10.316 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 08:47:10.320 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 08:47:10.320 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 08:47:10.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 08:47:10.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 08:47:10.323 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 08:47:10.328 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 08:47:10.330 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:47:10.331 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:47:10.331 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:47:13.940 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 08:47:13.943 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 08:47:13.943 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 08:47:13.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:47:13.946 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 08:47:13.947 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 08:47:13.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:47:13.949 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:47:13.949 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:47:13.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:47:13.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:47:13.952 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:47:13.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:47:13.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:47:13.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:47:13.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 08:47:13.969 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: c548e1d956b3100c231196ce98059162cba5b492ec02e56cfda24d51fcfbfbe86c61cb4a800d58d06f90e5cf9bad5c5e672a985442022f8a97d91b77df76d6045904a0dfa5bb35e400c759b989e4c908546e3c54db94b2b9a9a45b3878d74877d62db1b60fafbf4b3066c8979a203081e9f17a276fff4c24ddcc196c613888633f6a86cb9a0b202bf0f761997baf93ab3ca6f32353e31690165abc02781483c6c87eede6fabab6a667095f97654b56b2cb6d8ac531e7753be7d33be6493f03691877a67e6b9c3faa97526da8db53992eabb8ee58c99196f6d460f7e5b4e5e09be2ce598132fc04f0a392365844dc1bd46129e7bc1d58d674d8acbfb5e57f0d2a1250b6682f7fd77b4124b1c2d6ebcc35f97c11f3c68724c5cf2970998b33917598615fdf3e50ddbb07f6c6641df6e46165b9f0232c2bf037a24a94d888645b08f0c772c548c62383faac3d59550ecc299665c62e07addbda55f6e8919a0bd38bc2430f9ed8562ea80d4be8e347085b4f23d86a89aee1f418a7b5ee70c3fbb171 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:1e:d8:f3:02:d3:42:fc:26:1d:d2:e9:1e:40:24:72:31:e4:b0:f1],[56:66:d1:a4] modulus: af1f6645dfa9d721b568f77d76f622a1b57d5129c125d3b56b7dbdcbaaf5722577351aaad920cef535b57736fb110e833d47a008517943ed044c3daaf34a12731550b187affe5ae4cfe5cd75bef2540cc3c195e300e5f74448edbf743460791585dd473cb78336fccab0b3825c502d94cde9d0133b23600aed9695d26a9312dd54711f2127af6deb6248e79747aa5815ea2a771a146bfd3489d5f92cdc922f978a0281931acf907f9647a71e442a722555ee6f0ecf2e3a44825b02cfdcca6113d494e414edf736e00f34edfd9622b5f1cdc81b13b3af6e02cef4f7a1d119e43fc082232c21f4596ce944409bd9e62681a67fb8942a93683f3f380d70a539364b public exponent: 10001 ] 2023-02-01 08:57:45.960 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 08:57:45.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 08:57:45.974 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 08:57:45.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 08:57:45.977 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 08:57:45.978 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 08:57:45.978 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 08:57:45.979 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 08:57:45.980 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 08:57:45.980 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 08:57:45.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 08:57:45.993 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:57:45.994 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 08:57:45.994 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:57:46.810 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 08:57:46.812 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 08:57:46.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 08:57:46.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 08:57:46.825 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 08:57:46.826 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 08:57:46.826 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:57:46.827 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:57:46.827 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:57:46.829 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:57:46.829 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:57:46.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:57:46.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 08:57:46.835 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 08:57:46.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 08:57:46.837 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 08:57:46.844 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:14:e6:d8:48:19:8d:f4:22:73:8a:78:ed:3f:24:98:df:85:a2:f5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 09:03:16.145 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 09:03:16.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 09:03:16.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 09:03:16.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 09:03:16.157 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 09:03:16.158 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 09:03:16.158 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 09:03:16.159 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 09:03:16.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 09:03:16.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 09:03:16.168 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 09:03:16.171 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:03:16.171 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:03:16.172 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:03:16.943 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 09:03:16.944 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 09:03:16.945 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 09:03:16.945 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:03:16.947 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 09:03:16.948 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 09:03:16.948 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:03:16.949 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:03:16.949 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:03:16.963 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:03:16.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:03:16.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:03:16.967 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:03:16.968 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:03:16.968 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:03:16.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 09:03:16.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:4a:0c:5f:5b:2a:6e:ac:c4:59:17:ae:71:1b:a3:32:7b:fe:cd:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 09:21:47.155 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 09:21:47.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 09:21:47.161 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 09:21:47.163 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 09:21:47.164 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 09:21:47.164 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 09:21:47.165 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 09:21:47.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 09:21:47.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 09:21:47.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 09:21:47.172 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 09:21:47.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:21:47.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:21:47.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:21:47.892 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 09:21:47.893 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 09:21:47.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 09:21:47.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:21:47.896 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 09:21:47.896 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 09:21:47.897 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:21:47.897 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:21:47.898 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:21:47.899 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:21:47.899 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:21:47.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:21:47.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:21:47.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:21:47.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:21:47.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 09:21:47.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:1b:73:20:df:01:c9:6a:bc:b0:60:61:e4:b2:4f:e8:e0:50:a8:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 09:27:31.047 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 09:27:31.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 09:27:31.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 09:27:31.054 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 09:27:31.056 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-01 09:27:31.059 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 09:27:31.060 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 09:27:31.061 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 09:27:31.062 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 09:27:31.062 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 09:27:31.067 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 09:27:31.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:27:31.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:27:31.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:27:31.800 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 09:27:31.803 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 09:27:31.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 09:27:31.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:27:31.821 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 09:27:31.823 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 09:27:31.838 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:27:31.839 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:27:31.839 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:27:31.840 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:27:31.841 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:27:31.841 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:27:31.842 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:27:31.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:27:31.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:27:31.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 09:27:31.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:2b:3b:ec:b1:79:b8:1b:e2:bd:0f:9e:98:ed:3b:e4:f1:42:ce:41],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 09:35:57.360 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 09:35:57.376 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 09:35:57.385 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-02-01 09:35:57.386 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 09:35:57.391 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-02-01 09:35:57.400 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 09:35:57.401 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 09:35:57.402 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 09:35:57.403 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 09:35:57.404 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 09:35:57.414 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 09:35:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:35:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:35:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:35:58.688 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 09:35:58.689 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 09:35:58.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 09:35:58.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:35:58.701 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 09:35:58.708 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 09:35:58.709 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:35:58.709 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:35:58.710 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:35:58.712 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:35:58.713 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:35:58.714 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:35:58.717 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:35:58.717 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:35:58.718 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:35:58.720 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 09:35:58.728 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c8:44:f8:20:ed:09:37:a6:fc:e5:2e:e6:5f:74:36:26:29:b7:df:9a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 09:41:59.375 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 09:41:59.379 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 09:41:59.383 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-01 09:41:59.384 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 09:41:59.385 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-01 09:41:59.385 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 09:41:59.386 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 09:41:59.386 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 09:41:59.387 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 09:41:59.388 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 09:41:59.406 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 09:41:59.408 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:41:59.409 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:41:59.411 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:42:00.019 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 09:42:00.021 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 09:42:00.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 09:42:00.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:42:00.024 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 09:42:00.024 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 09:42:00.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:42:00.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:42:00.026 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:42:00.027 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:42:00.027 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:42:00.027 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:42:00.028 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:42:00.029 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:42:00.029 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:42:00.030 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 09:42:00.037 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:c4:3d:f0:30:4c:ec:fd:f5:03:e7:db:c6:5f:73:17:d4:55:20:2f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 09:42:34.097 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 09:42:34.099 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 09:42:34.100 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-01 09:42:34.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 09:42:34.102 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-01 09:42:34.102 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 09:42:34.103 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 09:42:34.103 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 09:42:34.104 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 09:42:34.104 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 09:42:34.109 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 09:42:34.109 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:42:34.109 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 09:42:34.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:42:35.173 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 09:42:35.188 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 09:42:35.196 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 09:42:35.197 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 09:42:35.198 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 09:42:35.199 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 09:42:35.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:42:35.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:42:35.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:42:35.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:42:35.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:42:35.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:42:35.203 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 09:42:35.204 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 09:42:35.204 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 09:42:35.205 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 09:42:35.213 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:ed:41:d6:db:8a:e0:11:ae:17:fa:85:84:20:ac:f1:d3:41:10:d7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 10:53:49.242 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 10:53:49.247 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 10:53:49.252 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-01 10:53:49.253 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 10:53:49.253 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-01 10:53:49.254 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 10:53:49.255 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 10:53:49.255 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 10:53:49.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 10:53:49.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 10:53:49.262 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 10:53:49.263 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 10:53:49.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 10:53:49.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 10:53:49.933 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 10:53:49.933 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 10:53:49.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 10:53:49.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 10:53:49.963 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 10:53:49.964 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 10:53:49.964 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 10:53:49.964 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 10:53:49.965 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 10:53:49.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 10:53:49.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 10:53:49.967 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 10:53:49.968 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 10:53:49.968 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 10:53:49.969 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 10:53:49.969 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 10:53:49.974 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:44:62:78:58:b8:b2:84:f7:29:86:69:aa:d9:e6:5a:84:1c:98:6c],[56:66:d1:a4] modulus: cc84d39870b88da93242cf68bad0370c0a579636100bd66de9eb67bed689bcc1b60c080346cce737b710e60b3a144e9ff4c6c800056308e5d00cc12d2d50b46cb171ccca2a4f194123c3618d9709ec4fa9d0aa2b4103a2304c43a4005f253e9d0bc9f6d45cbf1e7cc2bf2310eebe098eb8383a913c8a58d7e3085a9e40c1da9a74ff8dc9850d4ffa15790d160580f34dd165a882c5599ab5e06d3a200e6850cd84dfa92d64d4df3696e2860f80bb220ecf473c4ba889772d0a69e9015d5ce3db5e3bae3da86c9040130a432276a56bde519d8a56c81895174ad95b81ed8ab97f345280df57d7759c222647cdb47539ff39df6f63cb434e3758cec598135628e3 public exponent: 10001 ] 2023-02-01 10:54:00.740 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 10:54:00.741 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 10:54:00.742 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-01 10:54:00.743 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 10:54:00.743 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-01 10:54:00.743 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 10:54:00.744 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 10:54:00.744 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 10:54:00.744 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 10:54:00.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 10:54:00.749 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 10:54:00.749 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 10:54:00.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 10:54:00.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 10:54:01.241 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 10:54:01.241 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 10:54:01.242 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 10:54:01.242 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 10:54:01.243 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 10:54:01.243 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 10:54:01.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 10:54:01.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 10:54:01.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 10:54:01.245 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 10:54:01.245 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 10:54:01.245 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 10:54:01.245 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 10:54:01.246 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 10:54:01.246 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 10:54:01.248 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 10:54:01.255 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:5b:d4:54:2c:7c:37:c6:2f:ad:66:99:9f:7f:9f:ca:9d:1a:ad:9a],[56:66:d1:a4] modulus: bb18dfb0ab5e03ecbc4ec16fd03920efedb8ca4f5ca4d58c685519410d61702af99d3e08e4822b44a78689574f927234cdda6d08ebdfe5b544cc5777328930209f7df781d2d1f0d9e51964766013c064378d93786e45400eb2ef23c523ba80bac2bcd5e172ac2fe84de6caceea8107ffa19423492b80921336b647fcc515f329acefd3c2468eaff0a33b48849ed2b26993730971a69a0f0eb3b43f5ddf574b33c3bce02b07498c7f899053e294c2e9b8497de76339ee8a4e376fb2e4bb4c21f95c5a4113f0ea8060b8b6cfbe49c5fdaf7eb63b5d7595b0f271627736e120c675fef4f6b91b6683e70f6ab93706bc02c89382659b50f2892149f81dca4a36a17b public exponent: 10001 ] 2023-02-01 12:12:40.201 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 12:12:40.205 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 12:12:40.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-01 12:12:40.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 12:12:40.212 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-01 12:12:40.213 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 12:12:40.213 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 12:12:40.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 12:12:40.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 12:12:40.215 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 12:12:40.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 12:12:40.223 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 12:12:40.225 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 12:12:40.225 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 12:12:41.680 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 12:12:41.681 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 12:12:41.681 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 12:12:41.682 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 12:12:41.683 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 12:12:41.683 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 12:12:41.685 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 12:12:41.685 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 12:12:41.685 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 12:12:41.686 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 12:12:41.687 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 12:12:41.687 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 12:12:41.688 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 12:12:41.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 12:12:41.691 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 12:12:41.692 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 12:12:41.696 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:4c:13:f0:7b:0d:e9:d6:76:f9:b5:3d:f5:b6:1b:7f:90:1a:e5:e2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-01 12:12:51.468 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-01 12:12:51.469 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-01 12:12:51.472 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-01 12:12:51.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-01 12:12:51.474 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-01 12:12:51.475 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-01 12:12:51.475 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-01 12:12:51.476 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-01 12:12:51.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-01 12:12:51.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-01 12:12:51.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-01 12:12:51.483 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 12:12:51.484 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-01 12:12:51.485 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 12:12:51.967 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-01 12:12:51.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-01 12:12:51.968 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-01 12:12:51.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-01 12:12:51.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-01 12:12:51.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-01 12:12:51.971 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 12:12:51.971 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 12:12:51.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 12:12:51.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 12:12:51.974 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 12:12:51.974 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 12:12:51.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-01 12:12:51.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-01 12:12:51.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-01 12:12:51.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-01 12:12:51.980 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350818260901981987145403816432123511694108518182 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 01 05:17:54 UTC 2023 Final Date: Mon Jan 31 05:17:53 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad 1e93b8b7c43e56fbe89066896bb62905d45c347b b96427edaa75598f7f18838fe9dae0b184d5646b aba39f48517d32b99da6a680ea47ee2fd5e3d3d5 f9de2ee01f101efb7e8a5de1e5834567b60c9f6b a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd 3e915bdba1ef716d3e7a654e773ac267f51b95bd d12bf8b2183af09c95357035b68f2ce8196c2ac6 ba684401555afcb9ea1007f492d02040ec7a8816 e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f 4ed08b384aaab0fb2caaf14379ef2d4862458afd 4abf2a3407bc98ad55b073898d277035d49f2f61 a0987565e49db3c1366c12f315fce47fb921c042 b053c8eab52bff556f12a98d1eccf6efba80e1c0 808c900aab2c3393cd9efe875299309dd5cbeb4f 8677234b5754ccd43ec9b3883e4df356bb6f04be 527de10561498321e19134dc53163941b3b72e0a d90c2d4121af8c0d0f54443a153c6808443808d6 56893d83289ebba077bc99bf64c8246edd2943a9 1495aba8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:14:e1:fe:c0:80:a8:86:a8:a6:58:30:7b:76:49:12:de:de:b7:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]