By type
2022-05-08 12:42:48,727 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-08 12:42:53,432 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-08 12:42:56.528 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 08, 2022 12:43:06 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 08, 2022 12:43:06 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 08, 2022 12:43:06 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 08, 2022 12:43:06 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-08 12:43:09.141 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-08 12:43:10.635 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-08 12:43:11.326 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-08 12:43:14.531 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-08 12:43:14.535 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-08 12:43:14.537 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-08 12:43:14.616 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-08 12:43:14.737 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-08 12:43:14.816 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-08 12:43:15.413 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-08 12:43:20.625 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 08, 2022 12:43:23 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-08 12:43:25.032 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.814 seconds (JVM running for 47.852) May 08, 2022 12:43:29 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-08 12:44:11.517 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 12:44:11.526 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 12:44:11.716 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-08 12:44:11.721 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 12:44:11.735 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-08 12:44:11.737 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 12:44:11.813 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 12:44:11.815 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 12:44:11.815 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 12:44:11.819 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 12:44:11.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 12:44:11.830 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 12:44:12.032 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 12:44:12.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 12:44:12.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 12:44:12.116 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 12:44:13.513 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 12:44:13.515 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 12:44:13.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 12:44:13.516 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 12:44:13.527 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 12:44:13.528 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 12:44:13.528 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 12:44:13.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 12:44:13.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 12:44:13.539 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 12:44:13.539 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 12:44:13.539 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 12:44:13.619 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 12:44:13.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 12:44:13.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 12:44:13.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 12:44:13.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:a8:cc:c5:cc:ef:0b:82:16:7e:c2:ba:34:fa:16:24:6a:d9:42:00] modulus: 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 public exponent: 10001 ] 2022-05-08 17:03:46.966 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:03:46.969 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:03:46.972 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:03:46.973 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:03:46.973 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:03:46.974 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:03:46.974 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:03:46.975 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:03:46.975 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:03:46.975 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:03:46.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:03:47.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:03:47.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:03:47.014 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:03:47.247 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:03:47.248 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:03:47.248 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:03:47.249 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:03:47.252 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:03:47.253 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:03:47.253 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:03:47.314 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:03:47.314 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:03:47.316 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:03:47.317 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:03:47.317 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:03:47.318 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:03:47.319 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:03:47.319 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:03:47.320 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:03:47.325 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:31:e5:e8:9b:ca:00:cc:5b:19:8a:0d:ef:0f:a4:8e:ee:0f:e3:98] modulus: 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 public exponent: 10001 ] 2022-05-08 17:07:33.034 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:07:33.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:07:33.038 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:07:33.039 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:07:33.041 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:07:33.041 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:07:33.042 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:07:33.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:07:33.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:07:33.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:07:33.128 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:07:33.129 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:07:33.129 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:07:33.130 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:07:33.313 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:07:33.314 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:07:33.314 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:07:33.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:07:33.318 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:07:33.319 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:07:33.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:07:33.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:07:33.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:07:33.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:07:33.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:07:33.321 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:07:33.321 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:07:33.321 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:07:33.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:07:33.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:07:33.325 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: ab25ee23f4218aa602075e513ebe58b08b46f30d750750fec27259630f94cfa69f368439cb93bbae45caf90dc2850a9573ad327ea6843bb3b279999b67428d4e639169a8a8ce87f84aef653efca8d1223b59bd739f7fb00f018faf407a2b4af01342f147b5e241270673fd0d0741bf53595e187d57530df9f8992c682433582e8042a74b0292bebbfb137be5bddc153ff94e79d26cf209979208b8fcdb4ddb301dcd8cac33e0ce2ce92f33b27775fa7fb74275d1d57fff6b425c6fbcee20d071fedd033010e86c99085b5dd191d0717178c719108332e7b31233dfa8d22c77f8c68eda681094b1a27656c811313ee3623853450a8a63d05dbae9b7a59605362ca41862c3ad78d271c1fecfb98319f10c9a00cfbb55e6d163d6e96c67635677dae001ea77e9d9ee32671a5793e75fb69d3c2af2364dd0ca31aa276efd8fcc3f32902a5b2076f8aacbee8e0f0440a3f1ec56ea480ab722d10124b41e0af2baed7269399390089aaf7ad7bfc6814aceaf09f448025db02bf42d64b74c2b92cb5695 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:e7:a0:2b:56:0a:83:21:93:e3:c3:ad:fe:0e:02:10:84:92:b4:7f] modulus: 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 public exponent: 10001 ] 2022-05-08 17:11:11.393 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:11:11.394 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:11:11.395 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:11:11.395 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:11:11.396 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:11:11.396 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:11:11.396 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:11:11.396 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:11:11.397 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:11:11.397 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:11:11.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:11:11.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:11:11.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:11:11.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:11:11.501 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:11:11.513 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:11:11.513 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:11:11.513 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:11:11.514 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:11:11.515 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:11:11.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:11:11.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:11:11.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:11:11.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:11:11.517 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:11:11.517 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:11:11.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:11:11.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:11:11.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:11:11.519 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:11:11.522 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:04:85:b0:18:c5:5f:ca:45:73:26:fa:a4:40:3f:fa:eb:93:3f:e8] modulus: a229463b66c1dcd1e1aa17c8e27e9f64292b779a42a3a61390009656c556306825552a5b358a8bed9349a2a2f8cecaf71e4aa20f7ecc835775d03da2158a82560d4fba503f972bcb13f5392c4de3eb21540e4f660f04fcddab0bbfdf8277c1896c2ebfb8e5b0b0aa13a261a80ce838d83ef6801f44a4ac485459fdf1fbe2d5373e6548dd8e2186e49449bc938fb3e4a6ec40c5759247525216561dd29be71a0426292ff2bbe73d830ebfc774aff1d695ac619385449d535f7b6b1662d405b7b5747d0be75256aff14e2be6e9a5daa856d424fe516d77321ec3bf8e07de755277af1e2d488830ae83d3d55cfc274870606792995f1056455ce21849fc5b462477 public exponent: 10001 ] 2022-05-08 17:12:39.665 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:12:39.667 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:12:39.668 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-08 17:12:39.669 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:12:39.669 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-08 17:12:39.670 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:12:39.670 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:12:39.671 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:12:39.671 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:12:39.671 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:12:39.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:12:39.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:12:39.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:12:39.679 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:12:39.812 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:12:39.813 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:12:39.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:12:39.814 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:12:39.817 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:12:39.818 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:12:39.818 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:12:39.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:12:39.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:12:39.820 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:12:39.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:12:39.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:12:39.822 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:12:39.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:12:39.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:12:39.824 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:12:39.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:e4:69:50:86:45:27:a6:ed:2e:b1:e6:dc:e7:c0:0f:60:10:ee:28] modulus: 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 public exponent: 10001 ] 2022-05-08 17:14:58.577 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:14:58.578 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:14:58.580 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-08 17:14:58.580 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:14:58.581 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-08 17:14:58.581 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:14:58.582 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:14:58.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:14:58.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:14:58.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:14:58.588 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:14:58.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:14:58.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:14:58.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:14:58.668 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:14:58.668 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:14:58.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:14:58.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:14:58.670 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:14:58.670 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:14:58.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:14:58.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:14:58.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:14:58.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:14:58.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:14:58.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:14:58.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:14:58.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:14:58.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:14:58.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:14:58.714 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:76:3a:5f:62:65:71:b9:22:a8:0f:ce:ca:84:c6:f0:a4:5a:ec:cc] modulus: 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 public exponent: 10001 ] 2022-05-08 17:17:52.051 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:17:52.052 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:17:52.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:17:52.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:17:52.056 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-08 17:17:52.056 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:17:52.056 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:17:52.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:17:52.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:17:52.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:17:52.061 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:17:52.062 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:17:52.062 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:17:52.063 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:17:52.229 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:17:52.230 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:17:52.231 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:17:52.232 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:17:52.233 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:17:52.234 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:17:52.234 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:17:52.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:17:52.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:17:52.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:17:52.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:17:52.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:17:52.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:17:52.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:17:52.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:17:52.238 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:17:52.240 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:c0:49:26:86:f1:37:85:7e:b8:fe:df:d2:08:76:ce:2e:f1:4b:a8] modulus: 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 public exponent: 10001 ] 2022-05-08 17:18:40.499 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:18:40.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:18:40.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-08 17:18:40.503 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:18:40.503 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-08 17:18:40.504 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:18:40.504 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:18:40.504 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:18:40.504 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:18:40.505 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:18:40.509 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:18:40.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:18:40.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:18:40.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:18:40.615 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:18:40.615 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:18:40.616 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:18:40.616 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:18:40.618 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:18:40.619 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:18:40.619 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:18:40.620 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:18:40.620 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:18:40.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:18:40.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:18:40.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:18:40.624 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:18:40.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:18:40.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:18:40.627 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:18:40.630 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:8f:20:50:71:0c:7c:be:fe:7a:56:e6:ca:87:01:99:1f:ea:6a:55] modulus: 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 public exponent: 10001 ] 2022-05-08 17:27:28.850 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:27:28.851 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:27:28.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-08 17:27:28.854 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:27:28.854 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-08 17:27:28.855 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:27:28.856 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:27:28.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:27:28.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:27:28.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:27:28.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:27:28.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:27:28.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:27:28.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:27:28.964 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:27:28.965 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:27:28.965 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:27:28.966 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:27:28.968 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:27:28.968 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:27:28.968 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:27:28.968 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:27:28.969 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:27:28.969 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:27:28.969 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:27:28.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:27:28.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:27:28.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:27:28.971 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:27:28.971 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:27:28.974 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:00:ff:fc:8d:5d:43:50:95:2e:27:f7:98:ba:c6:5a:70:a1:4c:65] modulus: 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 public exponent: 10001 ] 2022-05-08 17:28:41.684 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-08 17:28:41.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-08 17:28:41.686 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-08 17:28:41.686 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-08 17:28:41.687 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-08 17:28:41.687 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-08 17:28:41.688 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-08 17:28:41.688 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-08 17:28:41.688 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-08 17:28:41.689 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-08 17:28:41.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-08 17:28:41.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:28:41.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-08 17:28:41.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:28:41.856 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-08 17:28:41.856 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-08 17:28:41.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-08 17:28:41.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-08 17:28:41.857 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-08 17:28:41.858 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-08 17:28:41.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:28:41.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:28:41.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:28:41.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:28:41.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:28:41.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:28:41.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-08 17:28:41.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-08 17:28:41.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-08 17:28:41.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-08 17:28:41.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380967845075549627752000766451191811399955053357 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 08 12:38:53 UTC 2022 Final Date: Fri May 07 12:38:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e0:16:4b:65:ab:ec:1e:2c:66:bc:ff:ea:cd:dc:af:5f:84:ff:b3:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 69c0dbc5feb2efe8a75c41c6c561edeac8c6764f 1e08b981bbd7d9216c0617446601916a0e1420f6 9b24871913396549ccfbd01e9081d2887b1e5ca9 f8936b3e6c37e0c78c3e7a6e5fc847640d0871a2 13f9bcf90471e8b65c3a4cb6204d68819e22c668 c191a3700fe4a0923c70417f472e4580036d37a1 f7d342bd35c963724acbfbafc215fd737606f70d c8e7bcb11ba9002baa0d4f72f1bfe2dd9415da0e ddc5d79d756eee8d32991e81550d9e4475df7f80 831c598a528019d68d686e2bab021357c9bd6c48 b67175df917dfa0f03aa7e651e3859aa9e1ff74a 9fe851340d36ceaeccffcffb7804f692e53d3bb2 081daba29e0b86e95d53ef35e63288a2120668f2 780572f389c13ec9524f0adc3102e87d62f18d65 9c08ef99aee199bccaf6e762cc0ff4530ed3404a f4ac03999f8e09eb1bafdf286b9fa6575e62654a cdc8d5990bb4830e0144c450651349bf5d9152b8 5dbcaf4e0206424c2adff99951170af89eff424b 6261aaacd71bcc61ad8facf4210edbd9495541b5 0fc59d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:ab:29:79:70:97:54:d3:20:80:88:23:a5:be:76:ec:04:d7:24:3b] modulus: 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 public exponent: 10001 ]