By type
2022-06-06 08:30:01,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-06 08:30:02,829 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-06 08:30:03.700 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 06, 2022 8:30:05 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 06, 2022 8:30:05 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 06, 2022 8:30:05 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 06, 2022 8:30:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-06 08:30:06.344 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-06 08:30:06.663 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-06 08:30:06.848 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-06 08:30:07.688 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-06 08:30:07.694 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-06 08:30:07.697 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-06 08:30:07.705 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-06 08:30:07.754 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-06 08:30:07.757 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-06 08:30:07.885 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-06 08:30:08.573 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 06, 2022 8:30:09 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-06 08:30:09.750 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.018 seconds (JVM running for 11.142) Jun 06, 2022 8:30:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-06 08:30:58.239 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 08:30:58.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 08:30:58.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-06 08:30:58.320 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 08:30:58.353 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-06 08:30:58.360 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 08:30:58.362 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 08:30:58.365 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 08:30:58.366 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 08:30:58.373 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 08:30:58.385 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 08:30:58.392 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 08:30:58.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 08:30:58.464 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 08:30:58.465 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 08:30:58.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 08:30:59.102 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 08:30:59.106 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 08:30:59.107 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 08:30:59.110 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 08:30:59.124 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 08:30:59.125 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 08:30:59.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 08:30:59.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 08:30:59.128 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 08:30:59.146 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 08:30:59.147 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 08:30:59.147 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 08:30:59.160 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 08:30:59.162 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 08:30:59.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 08:30:59.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 08:30:59.208 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:96:71:9a:ae:26:70:ad:d5:b0:fc:cd:dc:8c:04:70:88:c9:f6:34] modulus: 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 public exponent: 10001 ] 2022-06-06 10:32:12.044 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:32:12.047 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:32:12.051 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 10:32:12.052 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:32:12.053 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 10:32:12.054 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:32:12.054 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:32:12.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:32:12.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:32:12.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:32:12.064 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:32:12.066 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:32:12.066 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:32:12.067 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:32:12.303 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:32:12.305 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:32:12.305 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:32:12.306 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:32:12.309 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:32:12.310 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:32:12.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:32:12.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:32:12.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:32:12.313 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:32:12.313 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:32:12.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:32:12.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:32:12.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:32:12.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:32:12.317 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:32:12.323 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:a2:87:63:de:d3:5c:e4:a0:ef:bb:e6:0f:1a:18:db:0f:3a:de:bf] modulus: b4ea3438d0bf1aaa80ccd029668855f9fb75493513954ad506d4aca0515fd5c1ba5c2afbd8df1220e0bfbb30e6040421117efb8cdf60e81ba3b0c13f9ee99a1f9266d7df2c5adad3121e573af2fb84dd88b126dbb829695f5ea2915cf3c394f04733abdb51366349e4ef069831fccf24014ccd3b72bcca8bfa845550577bd546f036c8ee4460e1356316f3464b0ac6f1472c93cead0accce33f336bf02ba059f09fc4aceeec52fbd8b133c81c69405516fea829b70ae99a7f53e96abd51e3f04fb03d0d60c868df462e8b7bc5bb3af6e3bf8bdadb517509b0f0fd3a48bfd9a2f3e4a2ea18d8db836b191d57daa6cabc67a05de4eb088d65f51f093e770c2a471 public exponent: 10001 ] 2022-06-06 10:34:00.017 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:34:00.018 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:34:00.021 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-06 10:34:00.022 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:34:00.023 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-06 10:34:00.024 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:34:00.024 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:34:00.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:34:00.025 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:34:00.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:34:00.043 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:34:00.044 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:34:00.045 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:34:00.045 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:34:00.177 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:34:00.178 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:34:00.179 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:34:00.180 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:34:00.183 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:34:00.184 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:34:00.185 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:34:00.185 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:34:00.186 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:34:00.188 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:34:00.188 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:34:00.189 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:34:00.190 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:34:00.191 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:34:00.191 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:34:00.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:34:00.199 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:01:1c:ee:0b:bd:7b:b2:ba:c0:fa:e9:da:ad:ba:c7:5e:4b:10:3b] modulus: d21a241749a68e33198c5d91e5bb6aa677963885c327213610fc29eebec62d8c45158d2cc0f070176518ef38f2cc729f181210d6bfff163060ea4590fd6609d179571a657e5f613ef13ee88c8a3532d67fbef76dbb29e0d88d8522eecaeddbfa0f4c7a6cbaf7b13f351e6414e127aa247336ca9e87d463619de3e77c8c6e614d8a30d81a8f94a5157dd5c5aba4b5724d3e9f75734afc2d1aae0739984c12af38b74415d9697a96728819bc5feb0254114b649b657ad5eda06bd327b62bf914ebf1ddde33f660ce95a7f2076c17706a558bfd8bdd489a777f65979aa27157f15f1524474184d1006552a6ffa330d85fdfbe974f72412799ef28082b476027d38d public exponent: 10001 ] 2022-06-06 10:35:12.240 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:35:12.242 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:35:12.245 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-06 10:35:12.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:35:12.246 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-06 10:35:12.247 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:35:12.248 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:35:12.248 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:35:12.249 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:35:12.249 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:35:12.256 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:35:12.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:35:12.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:35:12.257 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:35:12.426 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:35:12.427 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:35:12.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:35:12.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:35:12.430 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:35:12.431 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:35:12.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:35:12.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:35:12.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:35:12.434 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:35:12.435 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:35:12.435 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:35:12.436 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:35:12.437 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:35:12.437 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:35:12.438 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:35:12.460 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:a9:5f:87:a3:5e:9b:03:fb:8c:7c:76:35:b8:fd:d1:06:88:70:0b] modulus: 9fa01ff0ffe97478dff10b76b5bb488f64251f2807d5edd4d5e408ab2843cdad926ef516472d23ad3e77d0d66211084d435a3791a6f0d83a13605d6fabf31f0e63157dfc96a130f97928d77b3e301310197188bd90321b7cf792686b23a1a466ea2146e4343508148ba88426d55aa60267577c1e7d6ff53a785d7873c56dc594127acb675f3a29c3195a92b6c63c9ab3303a38c355b59b094757ce5cf157f98b68d4deca5fbf5447128f54c624e99edebb8f6d76b958fd1cfb97dfa8aa8455735dd0083ba28e710d316cc777c29c13e693f42e3409187ad55d62d164c93b41ecbd8e5976cf9674b01d864e7ca960345e9609f43254d22daf28b9c3bb0d774f05 public exponent: 10001 ] 2022-06-06 10:37:32.024 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:37:32.028 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:37:32.031 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 10:37:32.033 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:37:32.033 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 10:37:32.035 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:37:32.035 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:37:32.036 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:37:32.037 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:37:32.039 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:37:32.048 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:37:32.050 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:37:32.050 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:37:32.050 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:37:32.207 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:37:32.208 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:37:32.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:37:32.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:37:32.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:37:32.211 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:37:32.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:37:32.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:37:32.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:37:32.213 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:37:32.214 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:37:32.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:37:32.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:37:32.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:37:32.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:37:32.218 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:37:32.222 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:fe:50:a0:da:43:1a:0f:8f:8a:25:44:c0:ba:0e:f4:01:ee:8c:a2] modulus: af3b1f928ec861271c6dea9ff4a109ca75f5a0f33aea8a095f9bd6064389864ceb64dd7a60d2b8753210f86b352455d4263f5988a1a6a48caaab258326482cc99dddb6f9c283abfbbc69f704a3765895c79ee413a0775e402e9c0561c5423dbfe7719a1b6c82adb1abea906fe06dabe8c8229689968ad3230632f77b504295146cb2ae566d3eb756d79ad7bc3815968ce91b11742d4eae45b48d43228ba37deeb99ca567e63da32f8e4a896f919f46fa43a96959973030d94816e067e5da9583abdfbcf224c9cb9b8b4ebd2dd36b988e3d213f8e39c4375319a128f5179dfa53fc6a73e548ab90c89ba82d694fc33b10426f1749668b4aab9dfe9a879385e3b9 public exponent: 10001 ] 2022-06-06 10:51:16.850 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:51:16.853 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:51:16.857 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-06 10:51:16.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:51:16.859 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-06 10:51:16.860 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:51:16.860 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:51:16.861 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:51:16.862 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:51:16.862 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:51:16.872 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:51:16.873 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:51:16.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:51:16.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:51:17.052 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:51:17.053 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:51:17.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:51:17.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:51:17.056 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:51:17.056 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:51:17.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:51:17.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:51:17.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:51:17.059 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:51:17.059 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:51:17.059 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:51:17.061 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:51:17.061 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:51:17.061 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:51:17.062 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:51:17.068 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:a9:f3:dd:d2:5a:6b:2d:46:93:b0:b1:b4:df:78:05:99:6d:29:62] modulus: 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 public exponent: 10001 ] 2022-06-06 10:56:29.637 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:56:29.640 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:56:29.643 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-06 10:56:29.645 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:56:29.645 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-06 10:56:29.646 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:56:29.647 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:56:29.648 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:56:29.648 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:56:29.649 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:56:29.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:56:29.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:56:29.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:56:29.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:56:29.848 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:56:29.849 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:56:29.849 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:56:29.850 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:56:29.851 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:56:29.852 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:56:29.852 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:56:29.852 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:56:29.853 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:56:29.853 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:56:29.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:56:29.855 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:56:29.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:56:29.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:56:29.857 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:56:29.857 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:56:29.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:28:7f:8e:9c:6c:bc:c6:9b:c7:51:bf:10:99:9a:4a:81:a4:a1:5c] modulus: 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 public exponent: 10001 ] 2022-06-06 10:56:44.319 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 10:56:44.321 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 10:56:44.323 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-06 10:56:44.323 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:56:44.324 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-06 10:56:44.325 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 10:56:44.325 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 10:56:44.326 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 10:56:44.326 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 10:56:44.327 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 10:56:44.332 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 10:56:44.347 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:56:44.348 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 10:56:44.348 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:56:44.488 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 10:56:44.489 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 10:56:44.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 10:56:44.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:56:44.492 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 10:56:44.492 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 10:56:44.493 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:56:44.493 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:56:44.494 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:56:44.495 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:56:44.495 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:56:44.496 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:56:44.498 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:56:44.499 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:56:44.499 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:56:44.501 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:56:44.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285111743824466046918790149707875083774914000257 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 08:27:52 UTC 2022 Final Date: Sat Jun 05 08:27:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a abff9206578dad2d594caca77720eb8ef4e25284 bd837c468b55d210ee83889bf5cef4f1465340d1 295d1bbc2c18d236d92adc45069ddd4ab148e034 31e089327b571548a25dddcee73adca258fc0ff5 3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc 7137c582cb77910c3b9726c6b1fd2e873af6fbdd a1203983b8c5b472d8905446fd65fb3336ac35ac b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f 31fbd7b777b91e33bd9d51667745018400981fb7 917490f1ea2be94a4c4617c589fe541cff284bd0 c5ef8eecbaf324a7cd623641427b45fd0051b8e1 1f12fdbdc666979d43caa03181bc42acf10387f4 0b0a271cc3dc7124ae2e5a1696d67461902e2363 3444abe7d70b9eb6f40215d54bdafa0307a2632d 6710055f4a71a738fdc3879416b87e7fe48ee5dd 69f734394055a6482f27104c55f3ada5745628bd 9921fdc00a9b60d0687c2822c6a1b5ee35f839b3 b829815ac751574b4531a4380ba312d10831a70c 8aaf4244 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:77:3e:20:f1:8d:43:0a:f2:7e:eb:ca:a7:c5:c0:23:70:f6:13:3c] modulus: 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 public exponent: 10001 ]