By type
2023-01-14 03:16:00,350 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-14 03:16:01,800 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-14 03:16:02.558 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 14, 2023 3:16:04 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 14, 2023 3:16:04 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 14, 2023 3:16:04 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 14, 2023 3:16:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-14 03:16:04.802 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-14 03:16:05.073 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-14 03:16:05.236 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-14 03:16:05.940 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-14 03:16:05.943 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-14 03:16:05.944 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-14 03:16:05.948 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-14 03:16:05.984 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-14 03:16:05.987 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-14 03:16:06.124 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-14 03:16:06.832 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 14, 2023 3:16:07 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-14 03:16:07.741 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.269 seconds (JVM running for 9.946) Jan 14, 2023 3:16:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-14 03:19:16.021 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 03:19:16.030 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 03:19:16.094 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-14 03:19:16.102 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 03:19:16.134 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-14 03:19:16.137 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 03:19:16.139 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 03:19:16.141 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 03:19:16.142 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 03:19:16.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 03:19:16.156 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 03:19:16.160 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 03:19:16.208 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 03:19:16.215 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 03:19:16.215 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 03:19:16.219 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 03:19:16.890 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 03:19:16.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 03:19:16.893 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 03:19:16.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 03:19:16.904 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 03:19:16.905 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 03:19:16.906 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 03:19:16.907 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 03:19:16.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 03:19:16.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 03:19:16.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 03:19:16.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 03:19:16.932 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 03:19:16.932 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 03:19:16.933 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 03:19:16.934 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 03:19:16.971 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:69:39:aa:e9:b9:1e:b1:55:20:fb:a4:5f:a6:0c:41:7a:1f:4c:37],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 10:37:52.817 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 10:37:52.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 10:37:52.831 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:37:52.833 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 10:37:52.834 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:37:52.836 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 10:37:52.838 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 10:37:52.839 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 10:37:52.840 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 10:37:52.841 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 10:37:52.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 10:37:52.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:37:52.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:37:52.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:37:53.059 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 10:37:53.060 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 10:37:53.060 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 10:37:53.061 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:37:53.063 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 10:37:53.064 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 10:37:53.065 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:37:53.066 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:37:53.066 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:37:53.067 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:37:53.068 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:37:53.068 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:37:53.070 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:37:53.070 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:37:53.070 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:37:53.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 10:37:53.076 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:7c:95:24:96:11:f0:54:ad:56:2b:40:32:05:58:ed:95:5a:6b:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 10:44:59.203 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 10:44:59.205 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 10:44:59.207 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:44:59.208 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 10:44:59.209 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:44:59.209 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 10:44:59.210 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 10:44:59.210 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 10:44:59.211 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 10:44:59.212 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 10:44:59.216 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 10:44:59.217 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:44:59.218 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:44:59.218 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:44:59.395 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 10:44:59.396 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 10:44:59.396 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 10:44:59.396 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:44:59.399 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 10:44:59.400 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 10:44:59.400 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:44:59.401 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:44:59.401 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:44:59.402 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:44:59.402 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:44:59.402 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:44:59.403 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:44:59.404 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:44:59.404 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:44:59.405 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 10:44:59.408 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:08:7e:3c:c7:08:bd:89:2d:e9:44:82:3f:3c:7a:8b:3c:2f:95:2b],[56:66:d1:a4] modulus: cf3ef830c0c59099e2e516f13f9ac429a526cea64624b4b53d1c39ac2f4a0a212765709edf45cb1b687537f82323a343ffa64fae321ab350522eb933aa0886d5b4878619d17e7c7f9de25fdcd62530606f227da72741e601ed896e98825cf23f8f4107d1141aff721ff77ff8785a27ac2d784665e585d371d44854ecec4218a4fe68a2a7507d9fe395d7f8602d6fe358f031b6de578092f51bb4c5c855369df758cd84e7b34ef4d017c50ba10bb96eaec606464f89785b90b34038b9e2eaaae66e30f337a7c75dfbe2afddfa8a582386c4bf0660d9489fd240aa524c4b02a6489f49b8b424b686c8c36c7ef58e3ca2288c9748eded0d4ab96e18f0ff508ee6bf public exponent: 10001 ] 2023-01-14 10:46:49.131 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 10:46:49.134 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 10:46:49.137 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-14 10:46:49.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 10:46:49.139 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-14 10:46:49.140 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 10:46:49.140 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 10:46:49.141 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 10:46:49.141 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 10:46:49.142 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 10:46:49.146 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 10:46:49.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:46:49.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:46:49.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:46:49.263 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 10:46:49.264 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 10:46:49.264 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 10:46:49.264 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:46:49.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 10:46:49.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 10:46:49.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:46:49.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:46:49.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:46:49.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:46:49.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:46:49.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:46:49.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:46:49.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:46:49.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:46:49.273 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 10:46:49.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: b3fb861a104f7ad626021e77d5ccc967e0f89b7ab9f1b86ae5261aa1d37b1546b86437abfde4d945ed23d5a36b9751df53beae68abadb6aa480e96d631bd5fafa40cd84ef6bf8e9af5de8c9cb65a79c2e415a4616a0eec5e824706933efe006bafa71e0c607186de99c346eb51e1d9249acb582a719dc7f4ea208be3c314c666918e4e9a98d2f1a60e02de76e83d3b0ab3c47e157a4df5a89de73d025db08e7aef87b40c050e4fd95ae357a781dac47aa598f857a3f72a448bee1af5b2b98d47c6564dcc29b32b13a65a7b9d6b7066b125d85db12b36f582bceca6200f38e6f31219cf06b45831e93c5195fd2165a75561b162ab2579b168aed0f81d91adf4c9fe8b872857911a1fb582f5a735d50bd7e6cfbde8f9ad8cc7338b62334b3d50666f5070f57818dae70054d0b130d93f81ae1b2554088a2200f40fcc4cc45f87f530d62b47242379675f10ed2d41302b10f9f0263ada4b87b4421ba7e88516d86c4aefd584c0802b82fa7a9baa307627cad66480d680b995f419f637b8fc69fc01 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:02:b0:79:7a:5f:6e:e1:60:24:58:ee:4b:ec:9f:04:c8:9a:ab:08],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 10:48:27.454 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 10:48:27.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 10:48:27.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-14 10:48:27.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 10:48:27.458 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-14 10:48:27.458 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 10:48:27.459 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 10:48:27.459 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 10:48:27.460 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 10:48:27.460 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 10:48:27.467 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 10:48:27.468 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:48:27.468 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:48:27.468 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:48:27.610 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 10:48:27.610 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 10:48:27.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 10:48:27.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:48:27.612 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 10:48:27.613 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 10:48:27.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:48:27.620 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:48:27.621 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:48:27.624 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:48:27.624 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:48:27.627 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:48:27.628 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:48:27.628 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:48:27.628 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:48:27.629 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 10:48:27.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:f5:93:b2:5f:3e:01:7d:54:fe:b7:07:88:66:05:96:69:62:cb:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 10:52:01.927 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 10:52:01.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 10:52:01.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:52:01.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 10:52:01.930 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:52:01.931 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 10:52:01.931 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 10:52:01.932 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 10:52:01.932 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 10:52:01.932 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 10:52:01.937 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 10:52:01.937 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:52:01.938 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:52:01.938 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:52:02.079 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 10:52:02.079 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 10:52:02.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 10:52:02.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:52:02.081 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 10:52:02.082 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 10:52:02.082 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:52:02.083 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:52:02.083 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:52:02.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:52:02.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:52:02.085 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:52:02.085 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:52:02.086 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:52:02.086 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:52:02.087 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 10:52:02.090 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:6e:4c:c6:cd:a3:2c:c1:da:dc:9a:69:63:0a:8d:54:d8:26:39:23],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 10:59:08.437 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 10:59:08.441 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 10:59:08.444 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:59:08.445 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 10:59:08.446 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 10:59:08.446 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 10:59:08.447 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 10:59:08.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 10:59:08.448 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 10:59:08.448 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 10:59:08.453 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 10:59:08.454 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:59:08.454 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 10:59:08.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:59:08.578 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 10:59:08.579 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 10:59:08.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 10:59:08.580 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 10:59:08.581 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 10:59:08.582 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 10:59:08.582 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:59:08.582 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:59:08.583 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:59:08.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:59:08.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:59:08.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:59:08.586 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 10:59:08.586 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 10:59:08.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 10:59:08.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 10:59:08.591 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:60:09:d0:48:be:78:ee:63:16:c0:92:53:9b:48:71:20:91:d0:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 11:05:19.596 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 11:05:19.599 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 11:05:19.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 11:05:19.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 11:05:19.603 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-14 11:05:19.604 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 11:05:19.604 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 11:05:19.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 11:05:19.605 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 11:05:19.605 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 11:05:19.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 11:05:19.610 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 11:05:19.610 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 11:05:19.611 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 11:05:19.775 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 11:05:19.776 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 11:05:19.776 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 11:05:19.776 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 11:05:19.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 11:05:19.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 11:05:19.779 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 11:05:19.779 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 11:05:19.779 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 11:05:19.780 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 11:05:19.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 11:05:19.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 11:05:19.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 11:05:19.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 11:05:19.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 11:05:19.783 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 11:05:19.786 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:e5:36:16:38:81:cc:05:34:6c:6d:e6:50:52:22:53:8c:76:66:ba],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 12:17:18.480 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 12:17:18.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 12:17:18.488 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-14 12:17:18.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 12:17:18.490 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-14 12:17:18.490 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 12:17:18.491 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 12:17:18.491 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 12:17:18.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 12:17:18.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 12:17:18.497 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 12:17:18.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 12:17:18.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 12:17:18.499 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 12:17:18.666 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 12:17:18.667 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 12:17:18.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 12:17:18.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 12:17:18.669 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 12:17:18.670 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 12:17:18.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:17:18.671 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:17:18.671 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:17:18.672 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:17:18.672 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:17:18.673 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:17:18.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:17:18.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:17:18.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:17:18.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 12:17:18.679 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:a5:dc:8e:a4:9e:f4:15:87:cc:2e:d3:6e:f6:96:fa:7a:34:97:f4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 12:36:23.479 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 12:36:23.482 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 12:36:23.484 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-14 12:36:23.485 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 12:36:23.485 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-14 12:36:23.486 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 12:36:23.486 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 12:36:23.487 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 12:36:23.487 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 12:36:23.487 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 12:36:23.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 12:36:23.493 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 12:36:23.493 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 12:36:23.494 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 12:36:23.669 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 12:36:23.670 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 12:36:23.670 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 12:36:23.671 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 12:36:23.672 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 12:36:23.673 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 12:36:23.673 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:36:23.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:36:23.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:36:23.675 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:36:23.675 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:36:23.676 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:36:23.676 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:36:23.677 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:36:23.677 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:36:23.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 12:36:23.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: b3fb861a104f7ad626021e77d5ccc967e0f89b7ab9f1b86ae5261aa1d37b1546b86437abfde4d945ed23d5a36b9751df53beae68abadb6aa480e96d631bd5fafa40cd84ef6bf8e9af5de8c9cb65a79c2e415a4616a0eec5e824706933efe006bafa71e0c607186de99c346eb51e1d9249acb582a719dc7f4ea208be3c314c666918e4e9a98d2f1a60e02de76e83d3b0ab3c47e157a4df5a89de73d025db08e7aef87b40c050e4fd95ae357a781dac47aa598f857a3f72a448bee1af5b2b98d47c6564dcc29b32b13a65a7b9d6b7066b125d85db12b36f582bceca6200f38e6f31219cf06b45831e93c5195fd2165a75561b162ab2579b168aed0f81d91adf4c9fe8b872857911a1fb582f5a735d50bd7e6cfbde8f9ad8cc7338b62334b3d50666f5070f57818dae70054d0b130d93f81ae1b2554088a2200f40fcc4cc45f87f530d62b47242379675f10ed2d41302b10f9f0263ada4b87b4421ba7e88516d86c4aefd584c0802b82fa7a9baa307627cad66480d680b995f419f637b8fc69fc01 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:2f:87:b9:c7:4f:85:6f:d2:69:4f:a3:e1:fa:c6:10:9e:c1:d4:80],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 12:36:42.922 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 12:36:42.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 12:36:42.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-14 12:36:42.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 12:36:42.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-14 12:36:42.930 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 12:36:42.930 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 12:36:42.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 12:36:42.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 12:36:42.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 12:36:42.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 12:36:42.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 12:36:42.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 12:36:42.938 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 12:36:43.044 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 12:36:43.046 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 12:36:43.047 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 12:36:43.047 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 12:36:43.068 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 12:36:43.068 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 12:36:43.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:36:43.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:36:43.070 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:36:43.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:36:43.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:36:43.072 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:36:43.077 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 12:36:43.077 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 12:36:43.078 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 12:36:43.079 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 12:36:43.084 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:96:0b:8e:4f:b0:65:51:40:94:b1:e5:1a:24:f1:60:b8:97:28:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 13:07:04.569 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 13:07:04.574 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 13:07:04.578 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-14 13:07:04.580 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 13:07:04.581 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-14 13:07:04.582 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 13:07:04.583 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 13:07:04.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 13:07:04.584 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 13:07:04.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 13:07:04.592 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 13:07:04.594 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 13:07:04.595 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 13:07:04.596 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 13:07:04.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 13:07:04.764 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 13:07:04.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 13:07:04.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 13:07:04.766 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 13:07:04.766 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 13:07:04.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 13:07:04.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 13:07:04.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 13:07:04.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 13:07:04.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 13:07:04.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 13:07:04.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 13:07:04.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 13:07:04.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 13:07:04.771 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 13:07:04.775 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:35:2b:97:ee:1c:51:b1:6d:67:07:54:2a:90:bb:8c:d5:12:da:bb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-14 13:07:10.778 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-14 13:07:10.779 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-14 13:07:10.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-14 13:07:10.781 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-14 13:07:10.781 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-14 13:07:10.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-14 13:07:10.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-14 13:07:10.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-14 13:07:10.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-14 13:07:10.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-14 13:07:10.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-14 13:07:10.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 13:07:10.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-14 13:07:10.790 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 13:07:10.881 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-14 13:07:10.881 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-14 13:07:10.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-14 13:07:10.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-14 13:07:10.883 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-14 13:07:10.883 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-14 13:07:10.884 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 13:07:10.884 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 13:07:10.884 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 13:07:10.885 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 13:07:10.885 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 13:07:10.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 13:07:10.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-14 13:07:10.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-14 13:07:10.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-14 13:07:10.888 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-14 13:07:10.892 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 441944373117423538199248105481427934534251795373 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 14 03:14:02 UTC 2023 Final Date: Thu Jan 13 03:14:01 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e 41e5b4891e55c6aae7445e814418ff80ff3f0848 5db6bec98eb921f8c608656943890b21cecfffdf dea0ddc36c34976d9908e57c039b34aea6424e72 d1cf75e20ab41ed57c3df3fa064e37b61660c86c eef3fb9516d2decd67224bce42e1862ca54d8177 7964ded09a08a61c689d0937c406e8ebceec3f2f 64fca28b2c46056a5b36c310589b1d9b825fd42a 7fd01a56f98de74a8ea4fe2234f48e2318676536 7a66e541897090e6d2c5d001d343ad69c6a64171 966b0f45e5664c6fa680c1ff13c9de3b1d90f51a 48016329fc4647680646ea2dcff5b302fc862068 66ae633f04041cab17cb00990b5e981aaf25b7e2 6d6a6b4b76afc5a4dce4ab7b664f4e609833a161 8690dc8cb3eb6d70561dc60873c30e0b75c86498 4070ea19a465781bc0e9893fe461a01a64849fed f86737c7ccd0975f7352d4e33dd8583f7bc9e3da 415d03aab0cc7ca3dd5bf1134a67662522f6b2ef b15c17a8d64a70c68af9f5490e139aa7fba35fa5 37c5a634 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:f3:dc:37:a2:10:48:80:25:f9:21:1f:c8:22:de:12:96:70:88:de],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]