By type
2022-06-19 03:18:32,996 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-19 03:18:34,021 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-19 03:18:34.811 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 19, 2022 3:18:36 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 19, 2022 3:18:36 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 19, 2022 3:18:36 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 19, 2022 3:18:36 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-19 03:18:37.458 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-19 03:18:37.758 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-19 03:18:37.924 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-19 03:18:38.750 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-19 03:18:38.754 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-19 03:18:38.755 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-19 03:18:38.760 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-19 03:18:38.810 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-19 03:18:38.816 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-19 03:18:38.961 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-19 03:18:39.680 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 19, 2022 3:18:40 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-19 03:18:40.563 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.446 seconds (JVM running for 10.266) Jun 19, 2022 3:19:06 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-19 03:19:24.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 03:19:24.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 03:19:24.235 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-19 03:19:24.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 03:19:24.272 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-19 03:19:24.275 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 03:19:24.276 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 03:19:24.278 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 03:19:24.279 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 03:19:24.284 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 03:19:24.292 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 03:19:24.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 03:19:24.352 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 03:19:24.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 03:19:24.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 03:19:24.386 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 03:19:24.965 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 03:19:24.969 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 03:19:24.969 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 03:19:24.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 03:19:24.984 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 03:19:24.985 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 03:19:24.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 03:19:24.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 03:19:24.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 03:19:25.002 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 03:19:25.004 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 03:19:25.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 03:19:25.018 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 03:19:25.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 03:19:25.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 03:19:25.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 03:19:25.097 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:c3:6f:d1:cc:07:62:01:1c:22:a5:f9:65:e7:1e:5f:40:07:c1:b2] modulus: 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 public exponent: 10001 ] 2022-06-19 04:42:54.597 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 04:42:54.600 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 04:42:54.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 04:42:54.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 04:42:54.605 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 04:42:54.606 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 04:42:54.607 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 04:42:54.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 04:42:54.608 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 04:42:54.609 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 04:42:54.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 04:42:54.622 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:42:54.622 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:42:54.623 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:42:54.870 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 04:42:54.872 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 04:42:54.872 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 04:42:54.873 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:42:54.878 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 04:42:54.879 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 04:42:54.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:42:54.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:42:54.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:42:54.884 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:42:54.885 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:42:54.885 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:42:54.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:42:54.888 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:42:54.888 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:42:54.890 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 04:42:54.899 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:ff:d5:66:50:b0:0b:95:5b:86:66:62:3f:c1:ec:c5:d8:38:79:70] modulus: f40977deb6915d9514c57c125ce9879f067d9e2b124e66316985b45a92e32d4083161d5bd66df73d5eeca2d949978c219cf443f0240e07bbd921c82a92520d8766b4913a352c104817232def06a4e889cca2fa5d8f119f60b467d797dc14806e6aa777ddc6497f347f8a5f626d264b3c406a47aca69f58dfe36c423baeb2bd84c1a8b26d6e80465b6f9cffa241da409d5dbb098cc59be3e67a77361d82380110a49ed3d53342ba229760b61704757e3b509d0d67d85a10a1e5025d2a88688b173db1273ff366ae8f8086e882609a1f762a7e5c2e9866348c5629a2407cd28526b58e7051e974d3643b4f2cd7e1fb1862bca3ac897dee2acb7713872b9264858b public exponent: 10001 ] 2022-06-19 04:44:57.537 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 04:44:57.542 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 04:44:57.546 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-19 04:44:57.548 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 04:44:57.550 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-19 04:44:57.551 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 04:44:57.552 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 04:44:57.553 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 04:44:57.554 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 04:44:57.555 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 04:44:57.566 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 04:44:57.568 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:44:57.568 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:44:57.569 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:44:57.769 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 04:44:57.770 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 04:44:57.771 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 04:44:57.771 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:44:57.774 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 04:44:57.775 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 04:44:57.775 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:44:57.776 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:44:57.776 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:44:57.777 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:44:57.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:44:57.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:44:57.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:44:57.779 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:44:57.780 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:44:57.781 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 04:44:57.786 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:10:0f:95:0f:3f:7f:7b:2f:35:be:3e:b5:cb:4e:99:3c:e8:50:c2] modulus: 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 public exponent: 10001 ] 2022-06-19 04:46:14.170 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 04:46:14.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 04:46:14.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-19 04:46:14.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 04:46:14.174 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-19 04:46:14.175 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 04:46:14.176 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 04:46:14.176 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 04:46:14.177 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 04:46:14.177 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 04:46:14.182 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 04:46:14.183 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:46:14.183 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:46:14.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:46:14.343 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 04:46:14.344 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 04:46:14.344 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 04:46:14.344 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:46:14.346 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 04:46:14.347 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 04:46:14.348 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:46:14.348 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:46:14.349 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:46:14.349 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:46:14.350 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:46:14.350 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:46:14.353 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:46:14.354 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:46:14.354 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:46:14.355 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 04:46:14.363 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: f468ff68e685e1dab9fd612c45c39c524e1f4ad1c5fef616f8dae86819a773c0d4eabfbd03223428464c0ce5fafca6ac6b35bf0b3e48b697149d71d59a8f0611e5fcf6506aa92f46fb275c46ba388e9ca54a90d227b819d52bd81d19d8bc7a3adf4fabe601fa3dcb0156fa5ef9777305493d46b83bd5328939bccfc8cd26265f6be41ff40d22ec4b33751cdba7827dd49e642af7ac76f184830db95ee95e0b82726f3c0ee90f59c375707147b178db85991a45bd6b40db0ae4518a5034b6b4ff99f713135297862fa1c03d276b18f362738301df930a26be8c622a46c2323f3911252d8c80799fae9849bae505e0ae4767c1d71050f3650b83511d63649fcfe51bbe56377bd7e3bc52277743327f26e3da3f56b267a3c97cd7c82a367770d8da7f2566b34ee4334cd816fd1496c10b5f2f9c329ce5c029b494c047f6f98a357ecf24dcccbf317f9b6682e7a1e39b85dbabb902bc6266e29edf773684a9f4e594a3d228b13f5904a50d5b0494cba6cfb47f3edde86d694086faf05cd99d1362a3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:15:4a:da:8b:d7:72:8c:61:29:0d:46:35:71:2f:20:38:dd:53:98] modulus: c22b38f15f0e7a25c0897ae610cf4cc36378ff825ed80d36010a631ed95982c2f1bf549ba2fbe2fbe49f50c97062f514a2cf9fb9d064cbea23553ca733b1360d6c3a9c01b7557222ae80324bcedd0120fefb9e49a03eeec8293d28d7c110e7d59f4316ef825f62e23caba03bd5a47989eda6b5af2197fc48cf5ec2002719ea25caf2f6c381e6c6ac7b0330f2601c19750fcfd4d2fbced5adbdfc641dd754005b36e4d465c6f121694ab40cd98dfae63769448c094e9064f089810507b4b7e2defddb7db294a26027a23d2b6a8766222ad8166f0705f1a980db726c0618ccd945a267be8d3d8106a5796326d4c341c621247aeac44d23af3ef6fa2789957b14dd public exponent: 10001 ] 2022-06-19 04:49:11.815 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 04:49:11.817 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 04:49:11.819 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 04:49:11.820 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 04:49:11.820 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-19 04:49:11.821 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 04:49:11.822 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 04:49:11.822 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 04:49:11.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 04:49:11.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 04:49:11.828 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 04:49:11.829 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:49:11.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 04:49:11.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:49:11.976 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 04:49:11.977 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 04:49:11.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 04:49:11.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 04:49:11.980 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 04:49:11.981 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 04:49:11.981 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:49:11.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:49:11.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:49:11.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:49:11.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:49:11.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:49:11.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 04:49:11.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 04:49:11.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 04:49:11.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 04:49:11.991 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: f468ff68e685e1dab9fd612c45c39c524e1f4ad1c5fef616f8dae86819a773c0d4eabfbd03223428464c0ce5fafca6ac6b35bf0b3e48b697149d71d59a8f0611e5fcf6506aa92f46fb275c46ba388e9ca54a90d227b819d52bd81d19d8bc7a3adf4fabe601fa3dcb0156fa5ef9777305493d46b83bd5328939bccfc8cd26265f6be41ff40d22ec4b33751cdba7827dd49e642af7ac76f184830db95ee95e0b82726f3c0ee90f59c375707147b178db85991a45bd6b40db0ae4518a5034b6b4ff99f713135297862fa1c03d276b18f362738301df930a26be8c622a46c2323f3911252d8c80799fae9849bae505e0ae4767c1d71050f3650b83511d63649fcfe51bbe56377bd7e3bc52277743327f26e3da3f56b267a3c97cd7c82a367770d8da7f2566b34ee4334cd816fd1496c10b5f2f9c329ce5c029b494c047f6f98a357ecf24dcccbf317f9b6682e7a1e39b85dbabb902bc6266e29edf773684a9f4e594a3d228b13f5904a50d5b0494cba6cfb47f3edde86d694086faf05cd99d1362a3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:d5:94:21:cc:0a:d0:d9:1d:4f:5f:af:3a:44:37:5c:fd:8c:be:27] modulus: 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 public exponent: 10001 ] 2022-06-19 05:02:03.310 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 05:02:03.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 05:02:03.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-19 05:02:03.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 05:02:03.319 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-19 05:02:03.320 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 05:02:03.321 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 05:02:03.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 05:02:03.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 05:02:03.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 05:02:03.330 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 05:02:03.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:02:03.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:02:03.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:02:03.569 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 05:02:03.571 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 05:02:03.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 05:02:03.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:02:03.578 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 05:02:03.579 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 05:02:03.580 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:02:03.580 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:02:03.581 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:02:03.582 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:02:03.583 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:02:03.583 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:02:03.584 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:02:03.585 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:02:03.585 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:02:03.586 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 05:02:03.592 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:eb:ef:56:e4:00:2e:76:d8:6e:09:f0:65:46:26:b9:c4:63:bf:cb] modulus: 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 public exponent: 10001 ] 2022-06-19 05:08:21.638 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 05:08:21.641 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 05:08:21.644 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-19 05:08:21.645 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 05:08:21.646 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-19 05:08:21.647 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 05:08:21.647 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 05:08:21.648 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 05:08:21.648 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 05:08:21.649 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 05:08:21.654 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 05:08:21.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:08:21.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:08:21.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:08:21.865 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 05:08:21.866 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 05:08:21.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 05:08:21.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:08:21.869 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 05:08:21.869 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 05:08:21.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:08:21.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:08:21.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:08:21.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:08:21.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:08:21.873 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:08:21.873 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:08:21.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:08:21.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:08:21.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 05:08:21.880 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:e6:b2:39:2f:2e:34:c5:1a:67:47:b8:ce:04:f5:a4:c7:a2:ee:f4] modulus: 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 public exponent: 10001 ] 2022-06-19 05:08:40.548 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-19 05:08:40.556 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-19 05:08:40.558 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-19 05:08:40.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-19 05:08:40.559 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-19 05:08:40.560 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-19 05:08:40.561 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-19 05:08:40.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-19 05:08:40.562 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-19 05:08:40.562 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-19 05:08:40.567 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-19 05:08:40.568 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:08:40.568 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-19 05:08:40.569 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:08:40.744 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-19 05:08:40.745 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-19 05:08:40.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-19 05:08:40.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-19 05:08:40.747 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-19 05:08:40.748 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-19 05:08:40.748 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:08:40.748 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:08:40.749 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:08:40.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:08:40.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:08:40.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:08:40.751 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-19 05:08:40.751 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-19 05:08:40.752 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-19 05:08:40.752 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-19 05:08:40.756 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 247078749709931818464343772043615132841791252063 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 19 03:16:33 UTC 2022 Final Date: Fri Jun 18 03:16:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b3:b2:40:ad:a0:d5:57:88:fb:10:3c:f7:58:b3:18:f3:3f:6b:30:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6089afb06d9d9dde04f3d9d9ea413cb49175bb72 6dfa76830481821bd1ec8b707be6c507f94bccbd a41da13a70e0ce98a015f2792e01da60c9a61659 e58b9f057e543708d3f567fdbe41e9258dcc0a65 b39eab5ee5ade406b8a9eacb7ed4b946c0ce344c 4055699f11216f25a878f0cad19832ef5279cba5 50be1624c492a8b806157b35a37c14d38f9230b9 76732696aede4ad1e118aa1b35a50a4024da5a9d ff6169ecc3bed4c6ba92f0f16fef8f28637a7952 da546453435aed6eb539bd3adfa679b8cd366280 659c2ff77ffccdc42d1d61b83b21f696f5b9db29 0f2b8df8f47bf4e7f7e68ac9555425fcaa1a9f5c 2587bc525e7164cba8068cf565d4836a9e549d6a f5ae2ef489f3b87633725f99c86a4e855d704f22 94b5c83900f0377db3f7b0595e7478656017f17c dd8d6c6f500820beb028902152ed2d577b181e38 8578e80bcb479b75a77cfdc030ffd536b01333f7 394120dd7411da0ad9d431763548d306d4b4f54f 25765fb49c5dd69f9e87605cbf84b0c8ca2d5fd3 98b14061 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:0c:36:11:34:48:de:c2:bd:79:4d:f2:6a:51:69:cb:a1:5a:5b:03] modulus: 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 public exponent: 10001 ]