By type
2022-05-31 03:21:17,730 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-31 03:21:19,076 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-31 03:21:20.035 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 31, 2022 3:21:22 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 31, 2022 3:21:22 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 31, 2022 3:21:22 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 31, 2022 3:21:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-31 03:21:22.895 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-31 03:21:23.202 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-31 03:21:23.417 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-31 03:21:24.203 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-31 03:21:24.206 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-31 03:21:24.208 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-31 03:21:24.212 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-31 03:21:24.255 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-31 03:21:24.258 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-31 03:21:24.389 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-31 03:21:24.953 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 31, 2022 3:21:25 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-31 03:21:26.005 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.256 seconds (JVM running for 11.377) May 31, 2022 3:21:53 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-31 03:22:10.483 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 03:22:10.491 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 03:22:10.529 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-31 03:22:10.534 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 03:22:10.552 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-31 03:22:10.555 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 03:22:10.556 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 03:22:10.558 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 03:22:10.558 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 03:22:10.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 03:22:10.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 03:22:10.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 03:22:10.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 03:22:10.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 03:22:10.610 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 03:22:10.614 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 03:22:11.175 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 03:22:11.178 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 03:22:11.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 03:22:11.180 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 03:22:11.190 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 03:22:11.192 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 03:22:11.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 03:22:11.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 03:22:11.194 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 03:22:11.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 03:22:11.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 03:22:11.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 03:22:11.214 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 03:22:11.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 03:22:11.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 03:22:11.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 03:22:11.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:3b:15:d7:22:39:7b:0e:0d:ad:c0:59:94:ce:c7:2a:3e:15:10:56] modulus: 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 public exponent: 10001 ] 2022-05-31 04:38:29.146 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 04:38:29.151 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 04:38:29.157 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-31 04:38:29.159 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 04:38:29.162 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-31 04:38:29.164 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 04:38:29.165 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 04:38:29.166 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 04:38:29.167 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 04:38:29.168 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 04:38:29.182 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 04:38:29.183 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:38:29.183 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:38:29.184 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:38:29.596 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 04:38:29.597 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 04:38:29.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 04:38:29.598 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:38:29.601 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 04:38:29.601 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 04:38:29.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:38:29.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:38:29.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:38:29.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:38:29.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:38:29.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:38:29.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:38:29.627 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:38:29.628 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:38:29.631 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 04:38:29.642 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:00:5e:39:96:d0:45:fb:a6:fc:00:d1:9e:9f:50:2e:84:2e:bb:31] modulus: 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 public exponent: 10001 ] 2022-05-31 04:40:00.919 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 04:40:00.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 04:40:00.938 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-31 04:40:00.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 04:40:00.951 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-31 04:40:00.955 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 04:40:00.956 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 04:40:00.957 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 04:40:00.957 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 04:40:00.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 04:40:00.971 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 04:40:00.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:40:00.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:40:00.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:40:01.203 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 04:40:01.204 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 04:40:01.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 04:40:01.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:40:01.210 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 04:40:01.211 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 04:40:01.212 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:40:01.213 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:40:01.214 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:40:01.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:40:01.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:40:01.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:40:01.221 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:40:01.221 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:40:01.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:40:01.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 04:40:01.230 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:3c:b1:14:f9:bf:e0:39:07:fd:94:67:71:33:78:6b:75:53:3b:e0] modulus: 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 public exponent: 10001 ] 2022-05-31 04:40:54.263 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 04:40:54.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 04:40:54.267 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-31 04:40:54.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 04:40:54.269 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-31 04:40:54.270 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 04:40:54.270 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 04:40:54.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 04:40:54.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 04:40:54.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 04:40:54.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 04:40:54.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:40:54.280 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:40:54.280 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:40:54.449 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 04:40:54.450 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 04:40:54.450 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 04:40:54.451 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:40:54.453 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 04:40:54.454 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 04:40:54.455 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:40:54.455 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:40:54.456 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:40:54.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:40:54.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:40:54.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:40:54.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:40:54.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:40:54.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:40:54.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 04:40:54.465 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:70:5d:3d:83:4b:ce:de:98:f1:ef:8a:95:6d:66:14:a5:55:37:e9] modulus: b942bf5854eba7ea892507584f279f164f9beee12d4355c025ee44ba82db31f381e7a07b5d92eeff2aa27844f16c5f64fa87c58a8239e24775376dc6edbbe8931a25ff5839b22d7f9b8c5002de0616f1516b07a2b7ee47ae5745e0f6bb35fc149af45477dde2ba32871e736f47368b71ba0d61a7d5a1c951516937d935ad9681def4e5f83fb3a2442e5ab5e27aeead9e40acf889aae64a2293fc59c4cba36a4b37e6ffb6e87ec0f3149f402dfc50346184f79122834b505f0eee18b143260806297d0bc453acddcae4f5f7e78d6e974f02c2e57520067d45677c1d1d430349467bcdd289d3b1f27ed8dddbf44b96acefb7665314e18994b24b4c5f5917b5f447 public exponent: 10001 ] 2022-05-31 04:42:44.748 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 04:42:44.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 04:42:44.751 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-31 04:42:44.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 04:42:44.752 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-31 04:42:44.753 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 04:42:44.754 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 04:42:44.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 04:42:44.755 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 04:42:44.755 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 04:42:44.760 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 04:42:44.760 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:42:44.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:42:44.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:42:44.912 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 04:42:44.913 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 04:42:44.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 04:42:44.914 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:42:44.916 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 04:42:44.917 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 04:42:44.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:42:44.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:42:44.919 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:42:44.920 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:42:44.920 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:42:44.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:42:44.922 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:42:44.922 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:42:44.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:42:44.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 04:42:44.936 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:93:2e:a9:92:b7:18:56:ad:7a:f0:99:84:30:94:c7:9e:f0:61:2a] modulus: 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 public exponent: 10001 ] 2022-05-31 04:57:57.076 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 04:57:57.079 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 04:57:57.081 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-31 04:57:57.083 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 04:57:57.084 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-31 04:57:57.085 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 04:57:57.085 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 04:57:57.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 04:57:57.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 04:57:57.087 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 04:57:57.094 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 04:57:57.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:57:57.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 04:57:57.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:57:57.276 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 04:57:57.277 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 04:57:57.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 04:57:57.277 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 04:57:57.279 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 04:57:57.279 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 04:57:57.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:57:57.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:57:57.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:57:57.281 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:57:57.281 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:57:57.281 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:57:57.282 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 04:57:57.283 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 04:57:57.283 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 04:57:57.284 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 04:57:57.288 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: e883acec9a5c3e787ecfb5a2c10c170f1667345fd707ee5e292a470aa1e9cdde7a64b894fd7f31f7c33b4eed39b34a1598838aadf8dd16bcc88f711b66f9b489070afedf829b4119afc6d14a95b4f3948274f194c2026819caa0f99cd104026f3cdfc2836ed5cc0a85a26d5171ea3846f37de0370b8299f055b813660fcf20a3b5f559ec469b53c3461a4fb4572e5166d358889f290dcba93d2f856ccc78ae16e7bcabb2e9bee05f1ab99826ecb732e8a4a9ed0f356bf4a8094fb46f4e30452762430b247e5e926e3e493d23e6c727ce00d651d6add540bf77c6d9514a11fafc130334749fa33c0a82f691f72d18b55c4b01defe4b6e2ebc59c360d30b9da99aee72eaf498544945af85a40ef91945564255282b568e07f9915c73b47c66b73c33c827ac0cf4d62757942adf878936850f5b6a9a5f83e2144514d93ec00863b9a8afbd3a5da8c2ce19b3bb38aa71e80d4ee02564ee1364a6535dff3e6ae4ec9d80d0b5ef688d0d30408039228678b6e5214cdf6c3f8586530368a887ee3b522b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:fa:3f:5b:3f:42:19:20:46:0d:0f:49:e5:68:8b:f5:08:40:d4:de] modulus: cbe8c4e6c85a80fc9afafe014dfadb4f539b669e8dd5a21e9d44ad4162b8d81aaf39c51383b4a5588d6472c2b3fe020d17c6283557ce94f0581c9162889d24a8f0ba5aebf8776396bbb9ce83f65bf291227612b8e0ce4bed42829e9d7a31be387d3e501431bcba25e387dfe4070b14fa996d5f63fa26a3d3cab4dd0560566ec22d0ce05b8752a1e8e05659d27dcfbc503dbf33e9ba97b787c0070cd8b41847ded4ef8d6786b9d892a64d49cd87faa48ba8035e452b47f37c28728ea5bb2cd069295950b6c7b1445c515c4308083e9faee5456a221f2321a0c1f7f0ca339a70cd4a694a32deccf31017279937c067c860b413878e8d4ff70cfe23fccc7231da9b public exponent: 10001 ] 2022-05-31 05:02:11.953 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 05:02:11.956 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 05:02:11.959 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-31 05:02:11.960 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 05:02:11.961 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-31 05:02:11.962 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 05:02:11.962 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 05:02:11.963 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 05:02:11.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 05:02:11.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 05:02:11.971 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 05:02:11.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 05:02:11.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 05:02:11.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 05:02:12.139 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 05:02:12.145 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 05:02:12.146 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 05:02:12.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 05:02:12.150 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 05:02:12.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 05:02:12.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 05:02:12.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 05:02:12.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 05:02:12.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 05:02:12.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 05:02:12.158 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 05:02:12.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 05:02:12.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 05:02:12.161 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 05:02:12.162 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 05:02:12.170 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:a4:63:13:dc:16:b1:3a:fa:f1:34:ca:1a:05:73:67:66:24:0a:17] modulus: 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 public exponent: 10001 ] 2022-05-31 05:02:25.109 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-31 05:02:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-31 05:02:25.112 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-31 05:02:25.113 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-31 05:02:25.113 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-31 05:02:25.114 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-31 05:02:25.115 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-31 05:02:25.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-31 05:02:25.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-31 05:02:25.116 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-31 05:02:25.121 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-31 05:02:25.122 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 05:02:25.122 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-31 05:02:25.123 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 05:02:25.267 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-31 05:02:25.268 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-31 05:02:25.269 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-31 05:02:25.269 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-31 05:02:25.271 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-31 05:02:25.272 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-31 05:02:25.272 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 05:02:25.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 05:02:25.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 05:02:25.275 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 05:02:25.275 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 05:02:25.276 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 05:02:25.276 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-31 05:02:25.277 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-31 05:02:25.277 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-31 05:02:25.280 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-31 05:02:25.285 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163350065890281317275900269055059712188247032276 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 31 03:18:37 UTC 2022 Final Date: Sun May 30 03:18:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e52f26547d600effda7bf89acac95f698a332b0d c7e59b0499615d1f430e03c31992cceecc394762 9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a f8560d0644b47c66207b524962e366c33db5469e 5633da88ca5109794642c06042b7aedde7d3283f 8d9d54bb690a7ed9e784d586cdb377b477a7f0a0 a5b6609f41df2ae9c2183ded428cf1cef8ea1b16 79f7e6158c602faaa9c6b66c45e4ad65942a3b88 adc327b46fee242e5e045e51f11b294db56fe2ec 37cded08d21d6ad0fa10fc88204c5d9b173cca6a 5b990a1be906ed1920ac27c37c6c1fad1efbd2a9 4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9 ebda5c7b4da6b27d4e4543afc335cf993c220516 58e2743d89c37e846d9f9357d4bea2a0d39bd004 5501c0be7917a3a86f9394ab78ec469f770e8964 0d83089090a84d721b79de63902f6cf810a95819 921da17144fbfb9e9e201f62323b1c9da4466c26 1f544a3a3feae4814859aa4417e7301f0c99585e 28cbfd9f43e304bbaef8bf52bfb703e792bfdd50 e0714d23 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:f3:2c:2a:62:2e:4e:f3:8b:89:b1:43:06:ff:89:40:45:f1:69:e1] modulus: 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 public exponent: 10001 ]