By type
2022-06-06 21:49:42,071 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-06 21:49:43,157 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-06 21:49:44.129 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 06, 2022 9:49:46 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 06, 2022 9:49:46 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 06, 2022 9:49:46 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 06, 2022 9:49:46 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-06 21:49:47.010 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-06 21:49:47.302 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-06 21:49:47.454 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-06 21:49:48.263 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-06 21:49:48.266 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-06 21:49:48.268 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-06 21:49:48.273 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-06 21:49:48.322 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-06 21:49:48.326 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-06 21:49:48.506 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-06 21:49:49.206 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 06, 2022 9:49:50 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-06 21:49:50.308 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.256 seconds (JVM running for 11.389) Jun 06, 2022 9:50:14 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-06 21:50:33.323 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 21:50:33.335 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 21:50:33.390 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-06 21:50:33.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 21:50:33.421 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-06 21:50:33.423 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 21:50:33.425 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 21:50:33.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 21:50:33.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 21:50:33.431 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 21:50:33.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 21:50:33.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 21:50:33.497 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 21:50:33.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 21:50:33.505 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 21:50:33.509 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 21:50:34.134 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 21:50:34.137 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 21:50:34.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 21:50:34.139 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 21:50:34.149 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 21:50:34.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 21:50:34.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 21:50:34.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 21:50:34.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 21:50:34.165 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 21:50:34.166 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 21:50:34.166 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 21:50:34.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 21:50:34.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 21:50:34.174 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 21:50:34.176 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 21:50:34.207 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:0f:8f:d9:ab:26:12:cd:14:70:ab:c4:6a:4f:39:9b:2c:12:27:09] modulus: 9e1f20945734639915131fb552a31cf4e4c6fce1f4439dc70812692545863ed81804e782ed7331c5e95f6350a768a76222d40b9e3509c64ea82d27cd779b94d594de744009141ed0c2cbed6f2fb8b6d69d4abe3e1391dee82921351266a762b4e5c29caafa7ad44628cb1632b63f9d06938eefe1a16e0f0091865ab61b23eb1aa48975d47b76d0a6a81da17773b0c1441ab709dda8688d032a3971834d7e2ad7950edcaaea0078fd304a3c4b866f488558fd4f217ab70dc42efd5134df204f18254f7748f6f84e91639e92d2e25c2966578128070688790b3388690aa4f582a90f4e865f3f84d1416e337f264c8383040e580c485fd02cfadeecbeada1d69537 public exponent: 10001 ] 2022-06-06 23:07:07.589 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:07:07.592 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:07:07.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 23:07:07.599 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:07:07.600 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 23:07:07.601 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:07:07.601 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:07:07.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:07:07.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:07:07.603 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:07:07.614 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:07:07.616 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:07:07.617 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:07:07.617 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:07:07.891 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:07:07.893 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:07:07.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:07:07.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:07:07.896 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:07:07.897 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:07:07.898 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:07:07.898 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:07:07.899 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:07:07.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:07:07.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:07:07.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:07:07.902 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:07:07.902 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:07:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:07:07.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:07:07.911 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:68:95:d3:f2:cb:d8:06:43:b5:13:9a:80:de:53:ac:b2:b8:11:c1] modulus: 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 public exponent: 10001 ] 2022-06-06 23:08:56.385 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:08:56.387 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:08:56.390 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-06 23:08:56.390 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:08:56.391 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-06 23:08:56.392 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:08:56.393 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:08:56.394 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:08:56.394 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:08:56.397 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:08:56.414 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:08:56.415 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:08:56.415 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:08:56.415 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:08:56.634 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:08:56.635 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:08:56.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:08:56.636 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:08:56.643 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:08:56.645 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:08:56.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:08:56.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:08:56.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:08:56.651 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:08:56.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:08:56.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:08:56.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:08:56.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:08:56.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:08:56.655 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:08:56.659 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:f1:a8:47:65:7a:6f:55:60:30:67:36:a6:c5:72:08:66:9d:b9:31] modulus: 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 public exponent: 10001 ] 2022-06-06 23:10:09.921 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:10:09.923 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:10:09.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-06 23:10:09.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:10:09.929 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-06 23:10:09.930 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:10:09.931 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:10:09.931 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:10:09.933 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:10:09.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:10:09.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:10:09.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:10:09.948 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:10:09.948 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:10:10.104 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:10:10.105 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:10:10.106 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:10:10.106 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:10:10.108 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:10:10.109 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:10:10.110 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:10:10.110 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:10:10.111 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:10:10.112 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:10:10.113 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:10:10.113 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:10:10.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:10:10.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:10:10.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:10:10.117 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:10:10.123 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:08:57:6a:55:6b:7b:a6:2c:fb:dd:d4:a9:98:ae:c0:47:5e:e2:4a] modulus: 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 public exponent: 10001 ] 2022-06-06 23:12:08.426 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:12:08.428 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:12:08.430 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 23:12:08.431 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:12:08.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 23:12:08.433 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:12:08.434 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:12:08.435 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:12:08.435 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:12:08.436 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:12:08.445 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:12:08.447 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:12:08.447 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:12:08.448 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:12:08.609 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:12:08.610 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:12:08.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:12:08.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:12:08.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:12:08.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:12:08.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:12:08.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:12:08.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:12:08.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:12:08.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:12:08.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:12:08.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:12:08.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:12:08.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:12:08.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:12:08.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:f9:3c:b6:9f:32:d4:15:dd:e4:aa:64:de:79:81:0b:6c:f1:6f:36] modulus: cd0d9fd303af98e64f390ead6bb691d3b5c264836058da01b20020c1d9038c29c59d21002ccf05da83f099f7fc24b78c7bb5677ed997e65690feb4636790cefa671d44dfaeb12f56cadc308bf6a8dd024dc269989551d9817d805b5367a0cbea64dfcaefa600d91f188b4e3812682ccbaf87a38977f4ed15a9f52be297af31ae0a9430ea5b3dbb81ee85d1189a36cc55cf82f391d9b3960ee5c245a4df24d3af4b0b439e6b0620c9d2ff31308b369603e03d9e081bdee6d66a430445d2098273903796f9d649b577a8404179563908d456a7ca276c9c78d9f7c3e30d3c302ea7fd39b6c8aae29cf1e96b1b5e6837778a9cb179b1d48cc715f6bc8c7561ba3e8f public exponent: 10001 ] 2022-06-06 23:19:34.051 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:19:34.054 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:19:34.058 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-06 23:19:34.059 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:19:34.060 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-06 23:19:34.061 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:19:34.062 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:19:34.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:19:34.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:19:34.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:19:34.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:19:34.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:19:34.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:19:34.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:19:34.260 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:19:34.261 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:19:34.262 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:19:34.262 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:19:34.264 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:19:34.264 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:19:34.264 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:19:34.265 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:19:34.265 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:19:34.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:19:34.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:19:34.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:19:34.267 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:19:34.268 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:19:34.268 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:19:34.269 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:19:34.273 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:d4:58:e9:fc:c5:0c:f2:55:81:22:b8:27:67:20:18:d9:c3:f2:31] modulus: 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 public exponent: 10001 ] 2022-06-06 23:24:35.426 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:24:35.430 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:24:35.433 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-06 23:24:35.435 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:24:35.436 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-06 23:24:35.437 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:24:35.437 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:24:35.438 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:24:35.438 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:24:35.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:24:35.444 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:24:35.445 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:24:35.445 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:24:35.446 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:24:35.605 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:24:35.606 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:24:35.607 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:24:35.607 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:24:35.609 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:24:35.609 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:24:35.610 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:24:35.610 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:24:35.610 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:24:35.612 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:24:35.612 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:24:35.613 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:24:35.614 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:24:35.614 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:24:35.614 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:24:35.616 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:24:35.622 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:2b:65:11:87:4c:e5:49:bb:34:b0:ca:b9:e9:0c:fb:13:e7:14:d6] modulus: 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 public exponent: 10001 ] 2022-06-06 23:24:54.211 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-06 23:24:54.212 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-06 23:24:54.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-06 23:24:54.216 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 23:24:54.216 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-06 23:24:54.217 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-06 23:24:54.217 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-06 23:24:54.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-06 23:24:54.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-06 23:24:54.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-06 23:24:54.224 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-06 23:24:54.224 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:24:54.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-06 23:24:54.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:24:54.368 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-06 23:24:54.369 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-06 23:24:54.369 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-06 23:24:54.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 23:24:54.372 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-06 23:24:54.372 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-06 23:24:54.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:24:54.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:24:54.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:24:54.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:24:54.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:24:54.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:24:54.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 23:24:54.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-06 23:24:54.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-06 23:24:54.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 23:24:54.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 269881079914567702200596891649353508387827638304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 21:47:21 UTC 2022 Final Date: Sat Jun 05 21:47:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e3:1a:ed:51:f3:e2:c9:06:11:ef:92:6f:c9:af:23:b4:06:d2:58] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 22f80feb4eaa97b57037c59b7520ee6d66b819d4 424655163cdd3304a11522feb0b311f2da8780c5 e81af4537f3cb077579a7cc3dbbd0eb77f1f99ae 6ff219afbfaac06302767dd0f9971f46e5301e27 8c8b2061bc1f23d72bc4a7a679654c47ffaa8c0b 0ea45715b00c0a9d4e687445f4dd6971ef8fd9b2 b1ebf0369bcc4bdd827070db8587fec1da978ae7 0bbb334da9b1e4aec31cf7dd3db92ec68b49f503 6a2ff7f0a33dfc8827a65c4f17c3babc8369488d db12b77d2c8edb461e1547ca3924f7d8d9c86176 e516c53f3a02b5b292b8dcb44b90c999597498b2 9127df3d2e99356f6e088f5a644c2b0999c26a05 f22a700f2425260157656e82ff52abcfa1ace912 d2890aa391cdb38d1a5a7d42d5c2ebe1e861a7cd 731d10ac868c69f34f895c2f9ad54ac1c2691bac 416d595fabd232a3c1c0238c29726238a9be1151 084382ab895bfebaabdab4ef663ebb4b2d56f1c6 886c04afe501fd383900427808aae486193351cd d3fc73c9c5054881b0df008932d039a3a0c4a680 3d579ec1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:78:62:fc:8d:cc:0f:21:80:ae:d0:e3:f4:51:47:f6:09:10:31:ef] modulus: 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 public exponent: 10001 ]