By type
2022-07-05 03:31:03,529 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-05 03:31:04,616 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-05 03:31:05.448 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jul 05, 2022 3:31:07 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 05, 2022 3:31:07 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 05, 2022 3:31:07 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 05, 2022 3:31:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-05 03:31:08.100 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-05 03:31:08.398 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-07-05 03:31:08.578 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-05 03:31:09.314 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-05 03:31:09.317 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-05 03:31:09.318 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-05 03:31:09.322 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-05 03:31:09.361 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-05 03:31:09.364 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-05 03:31:09.485 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-07-05 03:31:10.394 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 05, 2022 3:31:11 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-05 03:31:11.240 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.568 seconds (JVM running for 10.464) Jul 05, 2022 3:31:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-05 03:31:58.175 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 03:31:58.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 03:31:58.220 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-05 03:31:58.224 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 03:31:58.240 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-05 03:31:58.243 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 03:31:58.244 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 03:31:58.245 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 03:31:58.245 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 03:31:58.249 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 03:31:58.255 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 03:31:58.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 03:31:58.292 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 03:31:58.296 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 03:31:58.297 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 03:31:58.301 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 03:31:58.851 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 03:31:58.855 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 03:31:58.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 03:31:58.857 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 03:31:58.869 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 03:31:58.870 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 03:31:58.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 03:31:58.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 03:31:58.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 03:31:58.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 03:31:58.884 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 03:31:58.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 03:31:58.891 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 03:31:58.892 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 03:31:58.892 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 03:31:58.895 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 03:31:58.924 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 9b369ac33507d9013b53dfdbc4879e9ace804dfe04aae3f560406f79f9965021142f2c17001bcae4b23ed4ba5b263949c34c398da16ec47147f8a4731363907de332526064b09d7e2cc722a92ecb90f8b5e4b3724f88273c0403fa9057aef86ae4f9cdfa6a60fd5f22205a41cc8109572d26471131f8a7db37000fc6b3c4ca3cb37ca31e2266bd7ce2268c5a50d9d14af0410aaf4a3219ae1db2465708558a66aa0e3881c0db7af1e1aff7bdb56e2bd19d196c59123bd926c892a475bcc25f259baad277fc2ac5a3483c1d8b67c8fa27be5e9ff5e1b1aa62806b5c1a2d1de532ffbec5542269a8f37efd2dd7ffc65e13f1c09ebe39ee96a3bffa28831e8889399cd8ed48b792d7e9caa4db7c76ed469faed0c85482753092c0e8922165099fe965702b9893e1d14d04a60d4e983b588d2e13c97f052839dd4667e6529ea9e19280c3f7784d9fd122e6b91f42bfca7bb4cd37ecdfef570f8712dc9665842f7ba59b1ebf763dc0490fe9584dbfc70c00e5f6043f87d15949591b8b69b401bfa719 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:78:0f:d0:b1:d5:25:30:de:57:92:a9:ec:aa:3d:aa:4f:d8:8c:09] modulus: ce1ec91d37e2e1679fb27dc548282572ae28d29b089aad2e053a8c7ab94a95b23ec5111419104cad0236860947dfdb62358079dce747683f3cb74066c37bf8f6f158c2bc45257fd0686ac93f3ca71fbdab48b5222b80b902d2e25d007922464167ebb9e52bf6203ce61e029fa33665faa1b3398c31a3515bd724b23359508c640d8c7b8deca700286939f78ae876d694028f060f159123d9844da3b8801934c0fed755504ca9a583877df685d97e850995de6a6c27c9fa7d490a9408b46b9b4d2536ce21d8001568f24427398ae1a776693fd7c7fa8a83f67e703fb48b5f785ec5d3fff5b01272f5bfd11dcecd8bf5156985c8b0b447871b475fa21e7fcfdc1b public exponent: 10001 ] 2022-07-05 05:02:56.130 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:02:56.135 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:02:56.143 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 05:02:56.152 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:02:56.153 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 05:02:56.159 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:02:56.159 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:02:56.160 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:02:56.161 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:02:56.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:02:56.188 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:02:56.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:02:56.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:02:56.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:02:56.368 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:02:56.369 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:02:56.370 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:02:56.370 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:02:56.374 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:02:56.374 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:02:56.375 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:02:56.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:02:56.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:02:56.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:02:56.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:02:56.379 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:02:56.380 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:02:56.381 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:02:56.381 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:02:56.383 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:02:56.389 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:e8:11:2d:64:8d:a2:51:cb:12:98:b4:81:81:fe:52:96:0d:66:da] modulus: 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 public exponent: 10001 ] 2022-07-05 05:04:44.486 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:04:44.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:04:44.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-05 05:04:44.491 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:04:44.492 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-05 05:04:44.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:04:44.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:04:44.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:04:44.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:04:44.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:04:44.509 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:04:44.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:04:44.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:04:44.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:04:44.646 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:04:44.647 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:04:44.648 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:04:44.648 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:04:44.654 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:04:44.655 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:04:44.655 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:04:44.656 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:04:44.656 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:04:44.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:04:44.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:04:44.659 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:04:44.660 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:04:44.660 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:04:44.661 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:04:44.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:04:44.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:ba:70:a1:9f:9a:84:78:c1:0d:9d:ca:c0:49:ee:f0:4f:9a:db:5e] modulus: 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 public exponent: 10001 ] 2022-07-05 05:05:58.283 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:05:58.285 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:05:58.286 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-05 05:05:58.287 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:05:58.288 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-05 05:05:58.289 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:05:58.289 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:05:58.290 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:05:58.290 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:05:58.291 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:05:58.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:05:58.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:05:58.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:05:58.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:05:58.414 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:05:58.415 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:05:58.415 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:05:58.415 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:05:58.421 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:05:58.422 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:05:58.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:05:58.426 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:05:58.426 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:05:58.427 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:05:58.427 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:05:58.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:05:58.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:05:58.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:05:58.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:05:58.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:05:58.435 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:c7:ee:3d:25:d2:09:3a:53:6d:f8:61:44:0a:61:4e:92:84:da:1e] modulus: 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 public exponent: 10001 ] 2022-07-05 05:09:08.147 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:09:08.148 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:09:08.150 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 05:09:08.151 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:09:08.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 05:09:08.154 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:09:08.155 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:09:08.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:09:08.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:09:08.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:09:08.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:09:08.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:09:08.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:09:08.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:09:08.307 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:09:08.307 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:09:08.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:09:08.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:09:08.310 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:09:08.311 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:09:08.311 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:09:08.312 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:09:08.312 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:09:08.313 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:09:08.313 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:09:08.314 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:09:08.315 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:09:08.315 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:09:08.316 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:09:08.317 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:09:08.322 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 9b369ac33507d9013b53dfdbc4879e9ace804dfe04aae3f560406f79f9965021142f2c17001bcae4b23ed4ba5b263949c34c398da16ec47147f8a4731363907de332526064b09d7e2cc722a92ecb90f8b5e4b3724f88273c0403fa9057aef86ae4f9cdfa6a60fd5f22205a41cc8109572d26471131f8a7db37000fc6b3c4ca3cb37ca31e2266bd7ce2268c5a50d9d14af0410aaf4a3219ae1db2465708558a66aa0e3881c0db7af1e1aff7bdb56e2bd19d196c59123bd926c892a475bcc25f259baad277fc2ac5a3483c1d8b67c8fa27be5e9ff5e1b1aa62806b5c1a2d1de532ffbec5542269a8f37efd2dd7ffc65e13f1c09ebe39ee96a3bffa28831e8889399cd8ed48b792d7e9caa4db7c76ed469faed0c85482753092c0e8922165099fe965702b9893e1d14d04a60d4e983b588d2e13c97f052839dd4667e6529ea9e19280c3f7784d9fd122e6b91f42bfca7bb4cd37ecdfef570f8712dc9665842f7ba59b1ebf763dc0490fe9584dbfc70c00e5f6043f87d15949591b8b69b401bfa719 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:c7:a1:03:8c:d2:c8:6b:08:dd:4b:68:4f:42:69:99:62:c8:d2:d1] modulus: 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 public exponent: 10001 ] 2022-07-05 05:18:52.419 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:18:52.424 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:18:52.427 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-05 05:18:52.428 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:18:52.429 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-05 05:18:52.429 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:18:52.430 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:18:52.430 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:18:52.431 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:18:52.431 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:18:52.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:18:52.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:18:52.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:18:52.441 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:18:52.588 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:18:52.589 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:18:52.589 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:18:52.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:18:52.591 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:18:52.592 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:18:52.592 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:18:52.593 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:18:52.594 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:18:52.594 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:18:52.595 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:18:52.595 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:18:52.596 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:18:52.596 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:18:52.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:18:52.598 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:18:52.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:34:c8:66:f7:56:28:34:2c:02:1f:f0:88:7f:38:39:be:59:d2:01] modulus: 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 public exponent: 10001 ] 2022-07-05 05:24:19.561 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:24:19.564 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:24:19.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-05 05:24:19.567 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:24:19.568 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-05 05:24:19.569 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:24:19.570 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:24:19.570 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:24:19.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:24:19.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:24:19.579 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:24:19.581 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:24:19.581 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:24:19.582 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:24:19.720 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:24:19.721 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:24:19.721 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:24:19.722 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:24:19.723 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:24:19.724 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:24:19.724 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:24:19.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:24:19.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:24:19.726 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:24:19.726 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:24:19.727 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:24:19.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:24:19.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:24:19.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:24:19.729 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:24:19.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:ba:82:4b:de:bb:39:00:26:69:67:1d:55:04:c5:f5:db:43:e5:9b] modulus: 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 public exponent: 10001 ] 2022-07-05 05:24:36.757 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-05 05:24:36.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-05 05:24:36.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-05 05:24:36.761 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:24:36.762 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-05 05:24:36.763 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-05 05:24:36.763 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-05 05:24:36.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-05 05:24:36.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-05 05:24:36.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-05 05:24:36.774 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-05 05:24:36.775 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:24:36.775 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-05 05:24:36.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:24:36.890 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-05 05:24:36.891 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-05 05:24:36.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-05 05:24:36.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:24:36.893 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-05 05:24:36.894 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-05 05:24:36.894 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:24:36.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:24:36.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:24:36.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:24:36.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:24:36.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:24:36.897 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:24:36.897 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:24:36.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:24:36.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:24:36.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 129846302436767793201564540337061774675580235991 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 03:29:01 UTC 2022 Final Date: Sun Jul 04 03:29:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:4c:54:be:16:f2:09:5a:28:a4:f5:7d:ec:72:72:b9:dc:bf:76:e5] modulus: 9b369ac33507d9013b53dfdbc4879e9ace804dfe04aae3f560406f79f9965021142f2c17001bcae4b23ed4ba5b263949c34c398da16ec47147f8a4731363907de332526064b09d7e2cc722a92ecb90f8b5e4b3724f88273c0403fa9057aef86ae4f9cdfa6a60fd5f22205a41cc8109572d26471131f8a7db37000fc6b3c4ca3cb37ca31e2266bd7ce2268c5a50d9d14af0410aaf4a3219ae1db2465708558a66aa0e3881c0db7af1e1aff7bdb56e2bd19d196c59123bd926c892a475bcc25f259baad277fc2ac5a3483c1d8b67c8fa27be5e9ff5e1b1aa62806b5c1a2d1de532ffbec5542269a8f37efd2dd7ffc65e13f1c09ebe39ee96a3bffa28831e8889399cd8ed48b792d7e9caa4db7c76ed469faed0c85482753092c0e8922165099fe965702b9893e1d14d04a60d4e983b588d2e13c97f052839dd4667e6529ea9e19280c3f7784d9fd122e6b91f42bfca7bb4cd37ecdfef570f8712dc9665842f7ba59b1ebf763dc0490fe9584dbfc70c00e5f6043f87d15949591b8b69b401bfa719 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7a44e99e4e0673e4d06fa8714273b7a43c9ce275 456ae56b51c2434edffc23bdd6efcdc56120b018 db2317d11261a02ecad9644408852b4707d3e8aa 65e2b01fa511733715b1828def16152cbb4de594 b3221b078f56afe061378f7dd5259eb41e0006e7 96b946d0d49983d2a71f6295700fd0d8fdd4f6c7 cbe3781f05f3cf3d00bf4fc209f0612e82f3c1e8 51f89a7077dc5266cd072ae4f685145418064304 34b9b5c792449e6bd17b294ec008e3c2e8b5e32c c4eb7234a7c648d065328fa0dd066bec56248d0f 7c3091cf22bae1ab2a701550471879cd5ccb3cda b2b7f8199a4aab185a05596fab6f5e4d6a5f6fb6 0aba5ec3216722e8742b8b862748884137fd5ab7 7365e67dfc39547562e107a3c5713bb52cb6c77d f2276f1595f1d8ea583547541a64474aea80df2c 1cee97b9c710a11d971a3d0521f3a3cfba55aa8c a5dd67ef4c6ca1acdfeada29f52ba5e7bbf9f2a9 0f137f62de0a4c3c2da79de876ac986b18786d5d 6d7dd8cfcdb9ad36aa2306e2577fc9f437f33c31 1edd07b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:98:ba:ac:e6:d2:a4:5b:94:9b:9c:41:3d:8c:9f:69:be:10:3c:f0] modulus: c7cc0cb1aadde2f3e01bb55dcebe89016d7c9adcd6e43eb55417b3d784f25efc516e88d6e0faf4ccb14f0f487972b665a9a6a4008a357a6f9600e72972f87c4f3db78b48ac82165ab9221c2f432525ece23036b29815fa3225f63b66f13ec5059e0b2a6b30822fe821968d5f340a079271b8b43e95d60db00ff30f3d5c91fa9558f5a4af504fe0e74613546a153571c085ba3791f88aa7030679aa609b10d6e4b7364f1d7ed316013c0ff1641bae91c8276970f26832734ffc098a658a9fe440d4a1d68eb6b0852c7efa539ff386bf0b27c21a7df1d7ff5e3bbef0055a187b68fdf18da8bd7f540bb6e403c26b787cd50d12f9bffab4de37c1137b620d275c5f public exponent: 10001 ]