By type
2022-06-09 11:12:27,499 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-09 11:12:28,518 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-09 11:12:29.264 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 09, 2022 11:12:31 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 09, 2022 11:12:31 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 09, 2022 11:12:31 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 09, 2022 11:12:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-09 11:12:32.069 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-09 11:12:32.356 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-09 11:12:32.533 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-09 11:12:33.357 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-09 11:12:33.361 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-09 11:12:33.363 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-09 11:12:33.367 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-09 11:12:33.410 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-09 11:12:33.414 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-09 11:12:33.537 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-09 11:12:34.228 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 09, 2022 11:12:35 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-09 11:12:35.408 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.712 seconds (JVM running for 10.507) Jun 09, 2022 11:13:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-09 11:13:13.113 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 11:13:13.123 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 11:13:13.163 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-09 11:13:13.167 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 11:13:13.187 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-09 11:13:13.190 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 11:13:13.191 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 11:13:13.193 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 11:13:13.193 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 11:13:13.197 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 11:13:13.204 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 11:13:13.207 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 11:13:13.258 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 11:13:13.264 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 11:13:13.265 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 11:13:13.269 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 11:13:13.952 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 11:13:13.955 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 11:13:13.955 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 11:13:13.957 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 11:13:13.967 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 11:13:13.968 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 11:13:13.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 11:13:13.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 11:13:13.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 11:13:13.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 11:13:13.985 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 11:13:13.985 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 11:13:13.993 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 11:13:13.994 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 11:13:13.994 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 11:13:13.997 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 11:13:14.031 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:7b:f1:b9:cb:dc:aa:b9:dc:2e:57:0b:86:90:90:7d:b5:07:e5:1d] modulus: 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 public exponent: 10001 ] 2022-06-09 12:48:34.725 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 12:48:34.729 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 12:48:34.732 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-09 12:48:34.733 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 12:48:34.734 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-09 12:48:34.735 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 12:48:34.735 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 12:48:34.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 12:48:34.737 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 12:48:34.737 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 12:48:34.751 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 12:48:34.754 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:48:34.755 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:48:34.755 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:48:35.027 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 12:48:35.028 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 12:48:35.028 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 12:48:35.029 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:48:35.032 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 12:48:35.032 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 12:48:35.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:48:35.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:48:35.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:48:35.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:48:35.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:48:35.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:48:35.036 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:48:35.036 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:48:35.037 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:48:35.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 12:48:35.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:15:19:38:74:27:41:37:4e:17:fc:af:c4:d0:68:23:c5:a5:5a:97] modulus: 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 public exponent: 10001 ] 2022-06-09 12:50:37.625 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 12:50:37.626 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 12:50:37.628 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-09 12:50:37.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 12:50:37.631 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-09 12:50:37.632 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 12:50:37.632 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 12:50:37.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 12:50:37.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 12:50:37.639 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 12:50:37.654 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 12:50:37.656 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:50:37.657 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:50:37.658 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:50:37.807 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 12:50:37.808 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 12:50:37.808 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 12:50:37.809 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:50:37.814 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 12:50:37.819 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 12:50:37.819 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:50:37.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:50:37.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:50:37.825 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:50:37.826 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:50:37.826 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:50:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:50:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:50:37.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:50:37.830 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 12:50:37.836 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:d0:1b:59:72:3e:87:89:1d:98:d9:bb:bb:48:69:75:e4:9c:9b:89] modulus: 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 public exponent: 10001 ] 2022-06-09 12:51:50.422 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 12:51:50.423 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 12:51:50.444 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-09 12:51:50.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 12:51:50.446 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-09 12:51:50.446 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 12:51:50.447 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 12:51:50.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 12:51:50.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 12:51:50.451 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 12:51:50.457 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 12:51:50.458 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:51:50.459 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:51:50.460 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:51:50.654 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 12:51:50.655 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 12:51:50.655 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 12:51:50.655 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:51:50.661 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 12:51:50.662 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 12:51:50.663 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:51:50.663 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:51:50.663 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:51:50.664 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:51:50.665 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:51:50.665 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:51:50.666 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:51:50.666 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:51:50.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:51:50.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 12:51:50.673 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:78:77:79:b4:49:67:24:e5:7d:fd:6a:3a:4f:56:35:b6:66:1c:33] modulus: a72a6e51d18ca1e2764d3473419024a0cbbf5465ae1b3fd4b6a0d6693ef0b0e7c15d9eba19159412a07f94ae968c8584f5321cf350fceab43ab179b8e6b3095eb8e10ef6c970ebf9a55f68b91300aa3cb7d3ed3e5cb9ecfd24514a3608874cfd20c7a7fdd14a1f5a763c98fa1ed57d6e13155fba65219d2b71d8976c40f84179851f80d499d871ddcb77f1c6d2cb17760c9d58306359729b0795603ea4f26aaa89ace20c73bd89cd442f4b3df21b62ec4ffb4df509a89891b059c197059f85d039b256a8df4547c2acd9ceb600520deae90d2dd852d6b77fd9c76bf67dd6e74e11e99d743bb971083b8e1ebc31928eb89921c5db910daeeccd08d31365c62f87 public exponent: 10001 ] 2022-06-09 12:54:04.466 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 12:54:04.467 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 12:54:04.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-09 12:54:04.470 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 12:54:04.470 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-09 12:54:04.471 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 12:54:04.472 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 12:54:04.473 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 12:54:04.473 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 12:54:04.473 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 12:54:04.479 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 12:54:04.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:54:04.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 12:54:04.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:54:04.669 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 12:54:04.670 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 12:54:04.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 12:54:04.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 12:54:04.673 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 12:54:04.674 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 12:54:04.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:54:04.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:54:04.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:54:04.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:54:04.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:54:04.677 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:54:04.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 12:54:04.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 12:54:04.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 12:54:04.680 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 12:54:04.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:30:04:4b:a8:cd:c2:c8:ee:49:55:42:b2:e6:9c:4d:ee:80:75:f6] modulus: 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 public exponent: 10001 ] 2022-06-09 13:03:58.375 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 13:03:58.378 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 13:03:58.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-09 13:03:58.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 13:03:58.385 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-09 13:03:58.386 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 13:03:58.387 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 13:03:58.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 13:03:58.388 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 13:03:58.389 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 13:03:58.395 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 13:03:58.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 13:03:58.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 13:03:58.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 13:03:58.587 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 13:03:58.588 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 13:03:58.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 13:03:58.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 13:03:58.589 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 13:03:58.590 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 13:03:58.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:03:58.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:03:58.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:03:58.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:03:58.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:03:58.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:03:58.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:03:58.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:03:58.593 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:03:58.594 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 13:03:58.598 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:0c:fe:b4:d9:36:dd:d3:1b:57:22:41:ee:ce:62:26:f8:5a:32:a3] modulus: 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 public exponent: 10001 ] 2022-06-09 13:08:59.947 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 13:08:59.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 13:08:59.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-09 13:08:59.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 13:08:59.966 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-09 13:08:59.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 13:08:59.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 13:08:59.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 13:08:59.970 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 13:08:59.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 13:08:59.996 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 13:09:00.000 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 13:09:00.001 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 13:09:00.001 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 13:09:00.203 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 13:09:00.205 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 13:09:00.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 13:09:00.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 13:09:00.207 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 13:09:00.208 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 13:09:00.208 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:09:00.209 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:09:00.209 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:09:00.210 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:09:00.211 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:09:00.211 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:09:00.212 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:09:00.213 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:09:00.213 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:09:00.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 13:09:00.221 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:d9:8a:9a:bd:17:66:fa:d0:92:84:49:6e:75:71:7f:f1:a3:91:77] modulus: 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 public exponent: 10001 ] 2022-06-09 13:09:29.242 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-09 13:09:29.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-09 13:09:29.247 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-09 13:09:29.248 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-09 13:09:29.248 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-09 13:09:29.249 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-09 13:09:29.250 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-09 13:09:29.250 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-09 13:09:29.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-09 13:09:29.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-09 13:09:29.258 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-09 13:09:29.259 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 13:09:29.259 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-09 13:09:29.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 13:09:29.391 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-09 13:09:29.392 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-09 13:09:29.392 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-09 13:09:29.393 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-09 13:09:29.394 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-09 13:09:29.395 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-09 13:09:29.395 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:09:29.395 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:09:29.396 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:09:29.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:09:29.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:09:29.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:09:29.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-09 13:09:29.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-09 13:09:29.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-09 13:09:29.400 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-09 13:09:29.405 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 612685541863433803057860594488035219171357112787 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 09 11:10:27 UTC 2022 Final Date: Tue Jun 08 11:10:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2 ca14233c2371f983a5b52e06009a83644c695671 c5ce1f7481d2902cab83b10761ff995426ae2882 01419e930f7b3d1d7d0a67447fdf265188f52932 ca3cdfaa3f8499d48048b77939b7dba99ffaac1f 4b7bfb1de91fd1d86a6569438bfd657eb46bed48 6da3f4e0c91d1d950a2e482dd712078d0cfd41f2 affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1 75ab302661d7e7376ef26aa81c0dec1e545f8a48 aaf8724b3031ca55eb34e558456078ef8a8e8b19 138280822491dca3074603293802b59cb455424a a41b40ef6bfe2aa862f709a36c197f411f90ce9c a02be3c256ecd98499c2d00b135d8bfdad3666a1 484801e71b71a09d5e854c0d35fd7791da68e6ee 89f95367e035a7938ee337a2e1f4f6f3e124864a 3b79a558e30a08789c0a44a15f9cca6a8904dafe 1035e8faddd77c0bc6ba04d79998ed4fdb82720a 0770bfd92e84ccf63cd3a2a9a01eb28777a69798 a29149d6838186105050043c8191ace2352a70cd 2822556f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:50:45:a4:df:21:58:ba:53:55:50:90:e2:66:07:6d:1d:f6:93:bc] modulus: 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 public exponent: 10001 ]