By type
2022-05-16 02:05:05,012 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-16 02:05:09,702 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-16 02:05:13.010 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 16, 2022 2:05:22 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 16, 2022 2:05:22 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 16, 2022 2:05:22 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 16, 2022 2:05:23 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-16 02:05:25.211 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-16 02:05:26.411 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-16 02:05:27.110 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-16 02:05:30.209 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-16 02:05:30.212 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-16 02:05:30.213 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-16 02:05:30.215 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-16 02:05:30.409 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-16 02:05:30.412 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-16 02:05:30.909 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-16 02:05:35.305 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 16, 2022 2:05:38 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-16 02:05:39.701 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 38.304 seconds (JVM running for 46.305) May 16, 2022 2:05:47 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-16 02:06:23.099 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 02:06:23.109 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 02:06:23.311 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-16 02:06:23.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 02:06:23.326 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-16 02:06:23.328 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 02:06:23.395 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 02:06:23.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 02:06:23.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 02:06:23.402 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 02:06:23.410 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 02:06:23.496 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 02:06:23.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 02:06:23.611 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 02:06:23.611 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 02:06:23.615 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 02:06:24.983 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 02:06:24.986 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 02:06:24.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 02:06:24.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 02:06:24.996 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 02:06:24.996 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 02:06:24.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 02:06:24.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 02:06:24.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 02:06:25.008 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 02:06:25.008 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 02:06:25.008 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 02:06:25.096 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 02:06:25.098 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 02:06:25.098 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 02:06:25.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 02:06:25.210 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:fd:b8:b1:7e:9f:6e:7b:15:bf:88:9f:82:ab:6f:fb:ef:e7:20:35] modulus: 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 public exponent: 10001 ] 2022-05-16 03:38:21.722 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:38:21.725 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:38:21.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:38:21.728 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:38:21.730 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:38:21.731 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:38:21.732 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:38:21.732 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:38:21.733 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:38:21.734 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:38:21.805 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:38:21.806 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:38:21.806 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:38:21.806 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:38:22.015 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:38:22.015 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:38:22.016 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:38:22.016 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:38:22.019 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:38:22.019 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:38:22.020 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:38:22.020 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:38:22.020 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:38:22.022 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:38:22.022 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:38:22.022 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:38:22.023 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:38:22.023 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:38:22.024 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:38:22.025 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:38:22.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:d5:b6:7c:c3:c0:bf:04:5f:7a:44:46:fb:88:69:1e:1b:f3:3d:63] modulus: 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 public exponent: 10001 ] 2022-05-16 03:42:08.447 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:42:08.449 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:42:08.451 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:42:08.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:42:08.453 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:42:08.453 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:42:08.453 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:42:08.454 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:42:08.454 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:42:08.454 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:42:08.459 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:42:08.460 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:42:08.460 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:42:08.460 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:42:08.618 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:42:08.619 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:42:08.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:42:08.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:42:08.622 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:42:08.622 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:42:08.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:42:08.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:42:08.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:42:08.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:42:08.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:42:08.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:42:08.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:42:08.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:42:08.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:42:08.694 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:42:08.698 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:ef:52:e2:76:44:82:64:ca:15:aa:38:dd:12:a1:7b:f2:b2:50:86] modulus: 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 public exponent: 10001 ] 2022-05-16 03:44:33.666 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:44:33.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:44:33.668 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-16 03:44:33.669 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:44:33.669 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-16 03:44:33.670 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:44:33.670 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:44:33.671 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:44:33.671 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:44:33.671 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:44:33.678 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:44:33.678 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:44:33.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:44:33.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:44:33.791 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:44:33.792 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:44:33.793 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:44:33.794 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:44:33.797 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:44:33.797 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:44:33.798 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:44:33.798 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:44:33.799 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:44:33.800 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:44:33.800 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:44:33.800 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:44:33.801 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:44:33.802 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:44:33.802 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:44:33.803 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:44:33.806 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:f3:0e:d0:b7:ef:19:81:82:d6:10:f6:b2:4d:72:26:22:1e:fc:94] modulus: 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 public exponent: 10001 ] 2022-05-16 03:46:46.459 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:46:46.461 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:46:46.464 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:46:46.465 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:46:46.465 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:46:46.466 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:46:46.466 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:46:46.466 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:46:46.467 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:46:46.467 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:46:46.472 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:46:46.473 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:46:46.473 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:46:46.473 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:46:46.741 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:46:46.742 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:46:46.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:46:46.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:46:46.744 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:46:46.745 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:46:46.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:46:46.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:46:46.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:46:46.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:46:46.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:46:46.748 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:46:46.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:46:46.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:46:46.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:46:46.750 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:46:46.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:71:30:f3:f7:7d:a4:cd:5e:c1:0e:1a:5b:66:7d:ce:ee:d7:bf:56] modulus: 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 public exponent: 10001 ] 2022-05-16 03:52:09.124 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:52:09.126 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:52:09.128 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-16 03:52:09.129 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:52:09.129 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-16 03:52:09.129 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:52:09.130 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:52:09.130 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:52:09.130 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:52:09.130 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:52:09.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:52:09.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:52:09.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:52:09.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:52:09.619 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:52:09.619 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:52:09.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:52:09.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:52:09.621 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:52:09.622 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:52:09.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:52:09.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:52:09.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:52:09.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:52:09.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:52:09.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:52:09.624 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:52:09.624 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:52:09.624 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:52:09.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:52:09.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: e148c075be23cd183e83fa511c219bae88850769a37fec5ee06c778fb955186ad993665d3dcd92c6efe56479a56a59badaad465d4af51a3a2ac10dfb0774d7fda3bee8e048f22b14e8ccf3b09236f568d32a429de5c4c002720a1b8959451fc1593145c0b426d62d7191018e25e2a9d2ea12fdc89f72b725161d17fb0810b90c3db1d47b393ddcfe51ceab67b4d5a819ba431ba5f315bff2dbe4979600c682d4c70f481b2850a962121b0f96d328d64174684e856cc1d8ec56bcad70a759ff1b5372009dda9cfff23138c24cb17f8802f0ce1c196bffa8e1b9408508fa1f0047580415dd434ef6f18c111856aa38aa4c1b3239468cedac5e5736548454de9e61f857e26d423b84e060e3194e82c40316c559eee91383ce3a081c6b5b57633e7c848109fae7abc83e6d849181b8e5ff51df09d3378a672435edc318966c955f5d7e26514e22c32032c93d998ce2a70bc10c8bcb6a0a527ca1b81a1e7ba745ebc01902d9c26ffe2cc40c2b45cedbc0a43731c04a967386658ec212aee9423b092b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:cf:f1:e8:4f:62:ca:99:fc:7a:08:e3:9a:f0:87:2c:60:33:75:35] modulus: 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 public exponent: 10001 ] 2022-05-16 03:56:34.088 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:56:34.090 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:56:34.092 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:56:34.092 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:56:34.093 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-16 03:56:34.094 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:56:34.094 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:56:34.094 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:56:34.095 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:56:34.095 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:56:34.099 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:56:34.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:56:34.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:56:34.100 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:56:34.196 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:56:34.196 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:56:34.196 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:56:34.197 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:56:34.198 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:56:34.199 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:56:34.199 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:56:34.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:56:34.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:56:34.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:56:34.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:56:34.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:56:34.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:56:34.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:56:34.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:56:34.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:56:34.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:79:33:f4:44:22:8c:09:c8:86:fd:17:43:0b:fb:17:2e:25:c6:30] modulus: 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 public exponent: 10001 ] 2022-05-16 03:59:10.992 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 03:59:10.993 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 03:59:10.994 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-16 03:59:10.995 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 03:59:10.995 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-16 03:59:10.995 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 03:59:10.996 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 03:59:10.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 03:59:10.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 03:59:10.997 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 03:59:11.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 03:59:11.002 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:59:11.002 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 03:59:11.002 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:59:11.107 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 03:59:11.108 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 03:59:11.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 03:59:11.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 03:59:11.111 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 03:59:11.112 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 03:59:11.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:59:11.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:59:11.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:59:11.113 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:59:11.113 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:59:11.114 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:59:11.114 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 03:59:11.114 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 03:59:11.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 03:59:11.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 03:59:11.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:59:64:1b:15:a0:ca:df:74:f0:da:23:23:99:83:c9:de:9f:a0:cf] modulus: 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 public exponent: 10001 ] 2022-05-16 04:05:31.760 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 04:05:31.761 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 04:05:31.763 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-16 04:05:31.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 04:05:31.764 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-16 04:05:31.764 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 04:05:31.764 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 04:05:31.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 04:05:31.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 04:05:31.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 04:05:31.769 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 04:05:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 04:05:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 04:05:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 04:05:31.868 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 04:05:31.869 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 04:05:31.869 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 04:05:31.870 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 04:05:31.872 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 04:05:31.873 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 04:05:31.873 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 04:05:31.874 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 04:05:31.874 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 04:05:31.878 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 04:05:31.879 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 04:05:31.879 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 04:05:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 04:05:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 04:05:31.880 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 04:05:31.881 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 04:05:31.885 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:1e:67:f8:b0:cd:54:72:db:42:28:d3:24:d2:71:6a:f2:68:d4:7b] modulus: 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 public exponent: 10001 ] 2022-05-16 04:06:28.571 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-16 04:06:28.572 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-16 04:06:28.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-16 04:06:28.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-16 04:06:28.574 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-16 04:06:28.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-16 04:06:28.576 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-16 04:06:28.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-16 04:06:28.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-16 04:06:28.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-16 04:06:28.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-16 04:06:28.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 04:06:28.583 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-16 04:06:28.583 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 04:06:28.680 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-16 04:06:28.680 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-16 04:06:28.681 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-16 04:06:28.681 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-16 04:06:28.682 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-16 04:06:28.683 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-16 04:06:28.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 04:06:28.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 04:06:28.684 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 04:06:28.684 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 04:06:28.684 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 04:06:28.684 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 04:06:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-16 04:06:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-16 04:06:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-16 04:06:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-16 04:06:28.687 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 63837066820270943904512535267646159543056268369 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 16 02:01:41 UTC 2022 Final Date: Sat May 15 02:01:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:5f:bf:0e:29:e3:3b:0e:c9:fd:11:a8:c1:7c:6b:09:bf:8b:94:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 87c333e248f696189bc03950d5a0e5b39ae5d964 cefc57b300899080f07dc854625db0ac42e65501 0686bdde453b654fccc1a361a82bcfb61c9c76f2 b02d44e50da7f7281b3cd46a72ea24a56ca4452a 7c1d100b4ce334d09894efe703ed0124354618f0 5dd526b60593df83b70d3d225fa3b4197b65644f 7759cacf3d3e161e2adc4835d7606ddce6b79ef7 f36245ba06ef83b4303b545c6c2d1072724804a3 c7443e86ac8c36f9c973120fe28329cb119c17b3 80961dba6fa7a708cbfb12356c84d771fb13bd4e d63c29eef446d2ad0c42a0efa5e1ac72f5cf0609 cc885b1555208a7b9099dfe4b7b7999f6b3cba50 bfbec60c7949071ee83529edf508e669fddb94fb 57455993da6124403d59de93fcf5adf7c4909428 84c9813de6dc78a0c5997780e7f4c147da40c28d 2d2320705b214d70e09e3336c8e6705610fe2760 4566c9d0b8e2716ee3066f4b16b3d76b9b001c80 b441a21847d9cadc0ba7b5c6bfb3462ba8ce30ec 58ac3b9026e11b9c23af1c9bd22a433b4f090afc 008c30ce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:4e:2a:52:b8:3b:d3:a7:d0:e8:af:a1:15:29:2a:73:63:17:b0:4d] modulus: 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 public exponent: 10001 ]