By type
2022-11-18 11:32:28,923 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-18 11:32:30,320 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.5.8)
2022-11-18 11:32:31.089 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
Nov 18, 2022 11:32:33 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 18, 2022 11:32:33 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 18, 2022 11:32:33 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 18, 2022 11:32:33 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-18 11:32:33.857 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-18 11:32:34.133 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2022-11-18 11:32:34.314 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-18 11:32:34.978 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReloadConfigController:
{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-18 11:32:34.980 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.CertificationController:
{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-18 11:32:34.982 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReadinessController:
{GET [/ready], produces [application/json]}: checkReady()
2022-11-18 11:32:34.985 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.b.a.w.s.e.BasicErrorController:
{ [/error]}: error(HttpServletRequest)
{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-18 11:32:35.021 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.a.OpenApiResource:
{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-18 11:32:35.024 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.u.SwaggerWelcome:
{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-18 11:32:35.145 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {}
2022-11-18 11:32:35.755 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 18, 2022 11:32:36 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-18 11:32:36.656 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.583 seconds (JVM running for 10.374)
Nov 18, 2022 11:33:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-18 11:33:19.330 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 11:33:19.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 11:33:19.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-18 11:33:19.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 11:33:19.400 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-18 11:33:19.402 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 11:33:19.403 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 11:33:19.405 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 11:33:19.405 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 11:33:19.409 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 11:33:19.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 11:33:19.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 11:33:19.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 11:33:19.501 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 11:33:19.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 11:33:19.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 11:33:20.380 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 11:33:20.385 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 11:33:20.386 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 11:33:20.389 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 11:33:20.404 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 11:33:20.405 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 11:33:20.406 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 11:33:20.407 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 11:33:20.407 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 11:33:20.433 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 11:33:20.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 11:33:20.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 11:33:20.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 11:33:20.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 11:33:20.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 11:33:20.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 11:33:20.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [0a:c6:71:f1:d9:04:11:73:db:e7:8d:0a:13:e9:eb:68:6f:50:cc:9e],[56:66:d1:a4]
modulus: 9b1712fcc5beb280773d2d9f733f02375117edeecf22a0668056ee714e715c613546b7ae402575f1d9201f3c56c4884eaac2224f50a643e61585f84892dc386bf53339b73645efe435cc67cfd1d536c166ca9172aa425c247e9cd88a95324759819ec3ce81f9ace651c7c216d45a786475ff60e284a1ee7ddd7cb76e5ac840559d47a32108b498e48584c2a7ba1d25d8517c48aa49067ff4505cdcbf24df8ba28a03dd8d49bb0ddbc4faa39cc960261860f0306bba45d615e207a8648b1200501840f9f80801687c7321a496c1bbf7ccbf592b3550fae696b82373e3137331e25e866e3741a371235bd193fef999f18fcd45473148083fe7f4a2c543dea33f09
public exponent: 10001
]
2022-11-18 13:00:42.785 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:00:42.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:00:42.791 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:00:42.795 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:00:42.796 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:00:42.797 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:00:42.798 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:00:42.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:00:42.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:00:42.801 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:00:42.811 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:00:42.814 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:00:42.815 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:00:42.816 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:00:43.175 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:00:43.177 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:00:43.177 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:00:43.178 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:00:43.182 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:00:43.182 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:00:43.183 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:00:43.183 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:00:43.184 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:00:43.185 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:00:43.186 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:00:43.187 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:00:43.189 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:00:43.190 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:00:43.190 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:00:43.193 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:00:43.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [f4:8d:82:50:c3:5b:3f:aa:3a:28:fb:b5:e9:bf:20:40:6e:f6:df:93],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:02:14.485 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:02:14.486 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:02:14.489 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-18 13:02:14.490 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:02:14.490 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-18 13:02:14.491 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:02:14.492 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:02:14.493 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:02:14.493 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:02:14.494 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:02:14.501 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:02:14.502 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:02:14.502 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:02:14.503 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:02:14.643 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:02:14.643 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:02:14.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:02:14.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:02:14.647 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:02:14.647 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:02:14.648 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:02:14.648 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:02:14.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:02:14.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:02:14.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:02:14.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:02:14.651 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:02:14.652 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:02:14.652 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:02:14.653 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:02:14.657 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [bf:1e:47:7c:81:a2:09:cb:12:13:37:8c:61:f1:2a:1d:30:cd:bc:fe],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:03:36.712 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:03:36.713 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:03:36.715 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-18 13:03:36.715 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:03:36.716 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-18 13:03:36.716 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:03:36.717 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:03:36.717 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:03:36.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:03:36.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:03:36.722 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:03:36.722 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:03:36.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:03:36.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:03:36.871 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:03:36.871 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:03:36.872 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:03:36.872 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:03:36.874 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:03:36.875 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:03:36.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:03:36.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:03:36.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:03:36.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:03:36.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:03:36.878 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:03:36.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:03:36.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:03:36.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:03:36.880 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:03:36.884 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [da:38:62:1c:8d:76:34:68:8f:e5:54:a6:0c:37:a8:bb:2e:f2:32:e7],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:06:01.578 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:06:01.581 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:06:01.583 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:06:01.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:06:01.585 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:06:01.585 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:06:01.586 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:06:01.586 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:06:01.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:06:01.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:06:01.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:06:01.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:06:01.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:06:01.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:06:01.770 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:06:01.770 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:06:01.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:06:01.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:06:01.772 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:06:01.773 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:06:01.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:06:01.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:06:01.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:06:01.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:06:01.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:06:01.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:06:01.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:06:01.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:06:01.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:06:01.778 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:06:01.781 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [6c:9b:b4:a5:8a:f5:a4:7b:e1:86:6a:08:27:41:d5:12:29:da:6f:02],[56:66:d1:a4]
modulus: be95d762b52b94c182343eedfe65557e0e0587b1f233d38597fa3b5121268d1ad976b8f4257cff5a6b05497e3bd14cddf4fb8b8ffd4e01157efa385967159ebd6c6487eaa048a77a2484c2e14d15bcd96dff0c2c4653b5afed781d235143a2e06b55ba2157ee7a7fec6fe49c8e2fa8cc432fe0a6b5270a8e23204c3d5e25a7885a50b2fa36b6de8a6a3d5fddf79d87ff558b6569d1694e11088f913e03a7ba712290cfbdbd215193b9d4703a05a11d7aaed15b015ea7b69679a90d92afbbc6f8d2a069340105999b5662fe43c9b62eb392e91f2f197c19d269259c21414b502acf33989016a37ea006daf12a83980d895e2929a3c82809ca0632784408e45f27
public exponent: 10001
]
2022-11-18 13:13:24.865 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:13:24.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:13:24.873 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:13:24.875 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:13:24.875 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:13:24.880 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:13:24.881 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:13:24.881 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:13:24.882 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:13:24.882 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:13:24.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:13:24.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:13:24.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:13:24.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:13:25.054 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:13:25.054 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:13:25.055 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:13:25.055 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:13:25.056 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:13:25.056 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:13:25.057 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:13:25.057 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:13:25.057 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:13:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:13:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:13:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:13:25.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:13:25.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:13:25.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:13:25.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:13:25.063 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: ac4a799395f476e472c2c92bfbf0eeed442b031880750ecf58b8b6661d08f05a05e2c4a7f264df89e3c62033b39944c14965cd16de53fda5283487d668d36944656b45b05fc4f2a33d08ccda8c9979352d5d04c6b0fb37f37d86f0393083ab602ff9a26a322124dcaed15b35b921a954414dc3090af57d5e46958d09635879a082b2ce76bc197a6bbfa2f29d9dbb6763fc5302b627f18510d46306391da761953cfd922912e856fe39ce4b5d46fc2484fdf12213fafd8b0b8d8efbdd71f46c884b238b63eded1d76ac12e2c694b09ae1f3cc0b1047e3ea761e658507cb9dea51612b12c37b5bcbe11509495ae388057dda1f966f848ddcc01a4d1092a5decf0dc77e26ecd10f193514356d0017d667f713a5979a49c631ea9fcbe6ef8b5cd1406b6186e738c747c9c37caa650796f8f0df36534b86fd8ea04f2a4645a7fdf3f5de5ab523db5925d0c9d0786a348597c6e0a83ab40a7d9640d6113f3355ad5ecdeaa95820be3dd4fd25950cc688f1bf47fac1635ea75cc120e407b13287433135
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [57:3f:63:4e:07:04:52:93:e0:fd:af:da:e8:1f:54:93:bd:3a:11:cb],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:18:10.263 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:18:10.270 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:18:10.274 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:18:10.275 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:18:10.276 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 13:18:10.276 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:18:10.277 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:18:10.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:18:10.278 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:18:10.278 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:18:10.282 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:18:10.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:18:10.284 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:18:10.284 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:18:10.435 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:18:10.436 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:18:10.436 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:18:10.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:18:10.438 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:18:10.438 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:18:10.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:18:10.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:18:10.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:18:10.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:18:10.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:18:10.441 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:18:10.441 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:18:10.443 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:18:10.443 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:18:10.444 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:18:10.447 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [8f:cd:62:56:1f:fa:24:b9:1e:09:09:38:f8:f8:38:8c:06:ab:36:78],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:27:14.207 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:27:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:27:14.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-18 13:27:14.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:27:14.225 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-18 13:27:14.226 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:27:14.227 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:27:14.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:27:14.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:27:14.228 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:27:14.233 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:27:14.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:27:14.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:27:14.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:27:14.478 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:27:14.478 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:27:14.479 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:27:14.479 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:27:14.480 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:27:14.480 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:27:14.481 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:27:14.481 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:27:14.481 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:27:14.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:27:14.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:27:14.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:27:14.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:27:14.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:27:14.484 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:27:14.484 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:27:14.491 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [c4:e2:19:ee:5e:06:5c:bb:69:ba:02:56:a5:b8:b4:34:9c:a4:e9:47],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:33:01.267 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:33:01.271 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:33:01.273 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 13:33:01.273 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:33:01.274 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 13:33:01.274 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:33:01.274 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:33:01.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:33:01.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:33:01.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:33:01.279 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:33:01.280 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:33:01.280 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:33:01.280 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:33:01.441 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:33:01.444 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:33:01.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:33:01.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:33:01.446 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:33:01.446 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:33:01.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:33:01.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:33:01.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:33:01.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:33:01.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:33:01.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:33:01.449 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:33:01.449 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:33:01.450 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:33:01.451 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:33:01.453 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [32:0a:ce:6c:09:a5:84:8a:9c:8b:fe:11:f1:df:28:69:a4:e0:86:be],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 13:33:16.624 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 13:33:16.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 13:33:16.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 13:33:16.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 13:33:16.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 13:33:16.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 13:33:16.630 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 13:33:16.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 13:33:16.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 13:33:16.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 13:33:16.637 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 13:33:16.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:33:16.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 13:33:16.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:33:16.806 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 13:33:16.807 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 13:33:16.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 13:33:16.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 13:33:16.809 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 13:33:16.809 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 13:33:16.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:33:16.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:33:16.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:33:16.811 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:33:16.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:33:16.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:33:16.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 13:33:16.813 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 13:33:16.813 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 13:33:16.814 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 13:33:16.817 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [b0:5c:40:d8:8b:b5:4f:08:03:a6:27:74:e4:f5:34:79:b7:bc:36:de],[56:66:d1:a4]
modulus: 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
public exponent: 10001
]
2022-11-18 14:01:49.526 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 14:01:49.529 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 14:01:49.531 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 14:01:49.532 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 14:01:49.533 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 14:01:49.533 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 14:01:49.534 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 14:01:49.534 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 14:01:49.535 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 14:01:49.535 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 14:01:49.540 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 14:01:49.541 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 14:01:49.541 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 14:01:49.542 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 14:01:49.689 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 14:01:49.690 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 14:01:49.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 14:01:49.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 14:01:49.693 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 14:01:49.694 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 14:01:49.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 14:01:49.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 14:01:49.695 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 14:01:49.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 14:01:49.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 14:01:49.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 14:01:49.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 14:01:49.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 14:01:49.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 14:01:49.699 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 14:01:49.712 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [b4:58:f5:a9:37:40:72:55:d2:fa:48:e0:7e:5a:fb:7f:0d:8a:54:e2],[56:66:d1:a4]
modulus: e89b28d796b6c5b3a6bb246a2f576dc99ed84db55880b9b52ddd9fee0f0202d6d3a3a83d8c25dc0d48bb352c794d74ce6d245b17675c028495f235b695729337e16bfd98e56a6d69d54fd833c9f0521b87dd6ac2a5f9e14342eeedc04d32dbaac7982553585c9ff493cfea6fe48423012ec27e9910a8f2156c19e7735d588bbf3f236eb826b9761b7a96aac306db081d3bc1d03bbe09b868b1b690ac3fcdf9db7b06a02a3ab96fbff8f0d891e576b1957342e1d41be3abc9fba8146bb6cfaadb53a713ae6c3c7fc76368c13878f6d2e778445fd9226e0da1e89c916b6ea4f5983b1e580b3d2180ac89fc5f19ca4b8d7709ed9857a59a4943a0f7091390c2d599
public exponent: 10001
]
2022-11-18 14:01:56.570 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-11-18 14:01:56.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-11-18 14:01:56.574 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 14:01:56.574 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 14:01:56.575 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 14:01:56.575 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-11-18 14:01:56.576 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-11-18 14:01:56.576 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-11-18 14:01:56.578 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-11-18 14:01:56.579 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-11-18 14:01:56.582 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-11-18 14:01:56.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 14:01:56.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-11-18 14:01:56.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 14:01:56.686 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-11-18 14:01:56.687 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-11-18 14:01:56.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-11-18 14:01:56.689 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 14:01:56.690 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-11-18 14:01:56.690 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-11-18 14:01:56.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 14:01:56.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 14:01:56.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 14:01:56.693 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 14:01:56.693 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 14:01:56.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 14:01:56.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 14:01:56.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-11-18 14:01:56.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-11-18 14:01:56.697 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 14:01:56.699 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 264615270662292841690625017522374185256956760947
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Nov 18 11:30:13 UTC 2022
Final Date: Wed Nov 17 11:30:12 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 6902b4802b5000d510818d0643ec8118a4e9c861
134a943c4294aa43d28ff5dd9b10fe40ce6f76d2
9f05facfdcd82f051bdbe61fac0c206331bae43c
d4e94544a1ca69a82622cac80b6c549fd44f26fb
03c61c18a3da7785e9c5322b56991e607c520af0
5c7692ce0b82290251f65ebc329a465e639d28a9
ca12636734549d088884af2b0390be4146f17260
07b3ffb1273c20647bd895f4356a6f1ecef1fb7f
823db61cb89cc454250677a301ca026d0b9a937a
fb792412e8da4f6d9c219a01bad08230e70e7e3a
250fc9d34f497a448d12ef20bf3b9741a3564041
bfc06e1820df591e5c3363df61df02ce1b15a85c
c95f617d4be5c8def4812fd609bb633c320861cf
025944da711b4dea6b3d53cde418743bbbfaa133
007b05c554dd1b5c85c6c3062575fbe5e9e946d6
cbfc05653fa34f3f664a1b141b3addd0e6090b93
9a6e982873db30a0f7cafa30bacf5d10c9f21ccd
858b688bb41b03ad93cc697b34e1613282629001
87f13ad1346a71f524d26027b26a805833706ad6
07fc09d2
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [CONTEXT 0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [33:10:11:66:f6:49:84:17:ab:cf:ff:34:7d:6d:37:76:aa:cc:ff:5c],[56:66:d1:a4]
modulus: 987a668a004eebc2b4b04b294f2ac42f2e0b13b3c8a0878bdf6f1b656989bce45bd486672ac46c749993f0638a343e5ef46741cf6fa32879704329175309410a2dd3d3770107cda6170de527a9184b5f1eb4f58db8856cf51041db0b681e208a013252748e0f1ba2ff6356669c5c50d114bdbcf88655c2a90a416d7fd2492511f13e3c753daafdadf1bcb64f481c0d21ecc536d35ef7c2f69899950d695fc2ca2b31effe514985552a703ecae3fec6cc0f19b3c9063b31a0900f3e616f20629dc730da894831534a62095935163acafad8d4f9dcef357d31b8038fe16fa952968bd7f5ed200e048acc8e89ecb8728947762186d3913fb20de79cdfb98d9dbe47
public exponent: 10001
]