By type
2022-05-11 01:54:03,670 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-11 01:54:08,567 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-11 01:54:11.690 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 11, 2022 1:54:22 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 11, 2022 1:54:22 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 11, 2022 1:54:22 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 11, 2022 1:54:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-11 01:54:24.870 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-11 01:54:26.287 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-11 01:54:27.075 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-11 01:54:30.369 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-11 01:54:30.374 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-11 01:54:30.375 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-11 01:54:30.378 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-11 01:54:30.577 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-11 01:54:30.580 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-11 01:54:31.169 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-11 01:54:35.764 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 11, 2022 1:54:39 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-11 01:54:40.176 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 40.398 seconds (JVM running for 48.543) May 11, 2022 1:54:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-11 01:55:23.663 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 01:55:23.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 01:55:23.886 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-11 01:55:23.966 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 01:55:23.979 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-11 01:55:23.981 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 01:55:23.982 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 01:55:23.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 01:55:23.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 01:55:24.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 01:55:24.074 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 01:55:24.077 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 01:55:24.365 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 01:55:24.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 01:55:24.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 01:55:24.375 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 01:55:25.875 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 01:55:25.878 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 01:55:25.878 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 01:55:25.879 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 01:55:25.887 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 01:55:25.887 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 01:55:25.888 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 01:55:25.889 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 01:55:25.889 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 01:55:25.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 01:55:25.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 01:55:25.974 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 01:55:25.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 01:55:25.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 01:55:25.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 01:55:25.981 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 01:55:26.167 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:40:ed:36:a8:db:41:53:3b:01:f7:a9:e0:20:fd:d7:66:5b:57:3f] modulus: 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 public exponent: 10001 ] 2022-05-11 03:22:02.528 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:22:02.530 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:22:02.533 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:22:02.534 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:22:02.534 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:22:02.535 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:22:02.535 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:22:02.536 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:22:02.536 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:22:02.536 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:22:02.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:22:02.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:22:02.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:22:02.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:22:02.846 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:22:02.847 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:22:02.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:22:02.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:22:02.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:22:02.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:22:02.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:22:02.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:22:02.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:22:02.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:22:02.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:22:02.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:22:02.856 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:22:02.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:22:02.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:22:02.858 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:22:02.862 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:be:86:a1:a1:e1:06:a9:32:7c:91:fd:df:72:8a:1e:ba:56:b8:f8] modulus: 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 public exponent: 10001 ] 2022-05-11 03:25:51.851 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:25:51.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:25:51.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:25:51.856 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:25:51.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:25:51.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:25:51.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:25:51.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:25:51.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:25:51.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:25:51.869 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:25:51.869 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:25:51.869 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:25:51.870 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:25:51.971 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:25:51.972 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:25:51.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:25:51.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:25:51.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:25:51.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:25:51.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:25:51.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:25:51.977 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:25:51.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:25:51.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:25:51.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:25:51.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:25:51.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:25:51.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:25:51.981 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:25:51.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:c8:92:27:38:b1:89:a4:3c:ba:a4:93:33:23:1e:f7:37:9c:58:b2] modulus: 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 public exponent: 10001 ] 2022-05-11 03:28:04.366 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:28:04.367 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:28:04.368 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:28:04.369 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:28:04.369 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:28:04.370 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:28:04.370 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:28:04.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:28:04.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:28:04.371 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:28:04.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:28:04.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:28:04.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:28:04.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:28:04.597 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:28:04.597 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:28:04.598 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:28:04.598 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:28:04.601 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:28:04.601 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:28:04.601 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:28:04.602 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:28:04.602 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:28:04.603 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:28:04.603 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:28:04.604 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:28:04.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:28:04.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:28:04.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:28:04.606 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:28:04.664 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:29:f2:dd:a5:13:57:aa:09:bd:43:cf:2f:6f:55:de:f5:95:70:8c] modulus: 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 public exponent: 10001 ] 2022-05-11 03:29:27.665 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:29:27.666 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:29:27.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-11 03:29:27.669 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:29:27.669 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-11 03:29:27.669 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:29:27.670 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:29:27.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:29:27.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:29:27.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:29:27.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:29:27.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:29:27.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:29:27.676 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:29:27.775 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:29:27.776 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:29:27.776 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:29:27.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:29:27.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:29:27.779 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:29:27.779 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:29:27.780 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:29:27.780 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:29:27.780 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:29:27.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:29:27.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:29:27.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:29:27.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:29:27.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:29:27.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:29:27.785 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:bb:0f:f8:f3:bd:17:03:49:bb:9e:d2:1d:03:28:95:f4:b7:0f:98] modulus: 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 public exponent: 10001 ] 2022-05-11 03:31:15.688 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:31:15.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:31:15.691 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-11 03:31:15.692 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:31:15.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-11 03:31:15.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:31:15.694 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:31:15.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:31:15.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:31:15.695 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:31:15.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:31:15.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:31:15.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:31:15.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:31:15.838 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:31:15.838 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:31:15.839 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:31:15.840 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:31:15.842 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:31:15.842 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:31:15.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:31:15.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:31:15.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:31:15.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:31:15.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:31:15.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:31:15.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:31:15.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:31:15.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:31:15.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:31:15.849 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:62:4b:64:f3:92:56:fc:50:8e:93:76:20:85:ca:00:cf:b7:f8:bc] modulus: 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 public exponent: 10001 ] 2022-05-11 03:34:58.575 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:34:58.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:34:58.577 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:34:58.578 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:34:58.578 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 03:34:58.578 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:34:58.579 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:34:58.579 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:34:58.579 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:34:58.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:34:58.583 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:34:58.584 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:34:58.584 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:34:58.584 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:34:58.688 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:34:58.688 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:34:58.689 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:34:58.689 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:34:58.691 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:34:58.692 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:34:58.692 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:34:58.693 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:34:58.693 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:34:58.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:34:58.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:34:58.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:34:58.761 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:34:58.762 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:34:58.762 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:34:58.763 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:34:58.766 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:8c:42:7a:22:9b:62:21:b9:3f:4d:95:28:a2:c4:fc:c8:e7:e2:28] modulus: 9d9eff1970ab5b9dbbbab5058bb0c8d687918f1a1d06f6f5d1660311e2e80362bbb6685f8a9802c40cf7576ee2aae7f9664902b4b7c3fd414577b3db93f19d466e304e7b878bcb2520a2a2e5333621789cdccb0205634d0fc9a704ee52c772476e9903ced1c4e8c5c40b137f8b4d9c7ed864b1d351d7b507076994356d7385942bfa83ca5808e81cfd6e9dceb6e8b835e0d53ddca28be622a1210290a951d33c679b6eb63d76f7da32dcd67ccd5985d4c6faab6653b2f231e259a9399547ed7b2ba925c92f032eaa3316416b190fcf0a967f3b32961272bf687022d4e61416f85caf0239d97c19489ccb6c21e5deac4f34cee67131f4f6216ca5d0b6d50f984f public exponent: 10001 ] 2022-05-11 03:43:01.737 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:43:01.738 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:43:01.740 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-11 03:43:01.741 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:43:01.741 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-11 03:43:01.742 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:43:01.742 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:43:01.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:43:01.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:43:01.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:43:01.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:43:01.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:43:01.750 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:43:01.750 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:43:01.885 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:43:01.886 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:43:01.887 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:43:01.887 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:43:01.889 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:43:01.890 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:43:01.890 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:43:01.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:43:01.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:43:01.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:43:01.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:43:01.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:43:01.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:43:01.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:43:01.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:43:01.894 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:43:01.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:39:b6:50:5f:ed:80:bd:cf:64:08:e4:22:82:f9:1d:4f:27:bb:d6] modulus: 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 public exponent: 10001 ] 2022-05-11 03:51:17.365 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:51:17.367 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:51:17.369 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-11 03:51:17.369 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:51:17.369 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-11 03:51:17.370 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:51:17.370 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:51:17.370 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:51:17.370 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:51:17.370 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:51:17.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:51:17.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:51:17.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:51:17.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:51:17.573 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:51:17.574 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:51:17.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:51:17.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:51:17.576 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:51:17.576 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:51:17.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:51:17.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:51:17.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:51:17.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:51:17.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:51:17.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:51:17.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:51:17.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:51:17.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:51:17.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:51:17.665 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:e7:40:51:5d:5c:94:85:26:46:06:3c:44:8a:fb:7a:a4:5c:23:fd] modulus: c2be2617e4f61c434122aabdd930dbf6836e01affbc8d8970c1415e637123ce7ff73925e5b121bee59fae2eecab9d18da26617b579895a01d570f84f499a04af03dd17475a3d8599ee27bb01761fe06d263c23ab8f8d1415fbeb2f4bc2cb012e309dfb63d88fc4ab8f114a03e7f5aebb2d4b6ab5f8c966d667880437b29816e0cdefcf09db4d7b15a312141bdff8c5ea874a09c3c8360f21aeb599581c846662c30304f99dc2a322c8dbf0dbff75d0a82a5d727da8a3334a116c36a7adfb877fc552064e3cda1f907df8693cb2fda9c1840a12e699257349c549fdd0ff016efa4f3ee172167dd03a8411d6158d5c993e75e796c89d2e255da57ca48f380e494f public exponent: 10001 ] 2022-05-11 03:52:29.698 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-11 03:52:29.700 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-11 03:52:29.702 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-11 03:52:29.703 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 03:52:29.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-11 03:52:29.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-11 03:52:29.705 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-11 03:52:29.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-11 03:52:29.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-11 03:52:29.707 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-11 03:52:29.712 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-11 03:52:29.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:52:29.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-11 03:52:29.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:52:29.860 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-11 03:52:29.861 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-11 03:52:29.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-11 03:52:29.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 03:52:29.863 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-11 03:52:29.863 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-11 03:52:29.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:52:29.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:52:29.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:52:29.865 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:52:29.865 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:52:29.865 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:52:29.866 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 03:52:29.866 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-11 03:52:29.866 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-11 03:52:29.867 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 03:52:29.870 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 593552595396829744640238985123448280481292177056 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 01:50:40 UTC 2022 Final Date: Mon May 10 01:50:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [80:f8:0c:61:5f:03:8b:a5:4e:13:9c:f5:84:cb:91:fd:1f:2f:b9:6a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1efcf10b7ca009021714a0648fbb826a24a651bf bc7ef8dc517ba73718be0eec7057b2629ed5261f 8c145d24b40324497e38f0c598cb9820cc25a401 c470cb85b318ef898dcc57ff174bb43e1b13fcfb 1608a34b532f889284d8593290e255f28a7a0e3f 29d97435ab1f49c3320378a5c86f2dcbb9ef797e fb681d2fe87ec9fafb49244cfb3c9203a8d4e427 7113e52d6edd7666a3953168b2421d286aa33782 46e1a3b6ffaf5a915084e79cc1f84753ec4904ac ce2eba3b4f3c6e058b94be7c74598ed44c9a11ad 3a4beef58a80225991c7764ff062e00b103c0544 94d94ad4bfa6654efe11115ec2abfdfce1647035 e6c5e7637385c0b3b56c522ed6e849f04dc7882f f282ed19a00bfcbc35ba7f036350d05c0b986013 d75a631cbb0b5e26e9ccc1bdde1866fc4f2d2261 17de11566b4569217421b80262734dac73ed5243 4c620839b95f815ee74ad50e165f55c31fafcea2 758bc1c109363a534ca76f46d4039caf561c0bc5 b4e3ec663c1c519eabe2d71ccbcd9fa5b91d8d45 36b54712 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:24:96:ee:6b:a8:02:21:c9:14:94:f3:be:17:ca:f9:7e:e8:2b:b4] modulus: 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 public exponent: 10001 ]