By type
2022-10-01 03:13:06,368 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-01 03:13:07,462 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-01 03:13:08.329 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Oct 01, 2022 3:13:10 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 01, 2022 3:13:10 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 01, 2022 3:13:10 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 01, 2022 3:13:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-01 03:13:11.296 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-01 03:13:11.604 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-10-01 03:13:11.782 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-01 03:13:12.649 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-01 03:13:12.654 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-01 03:13:12.656 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-01 03:13:12.663 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-01 03:13:12.706 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-01 03:13:12.710 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-01 03:13:12.846 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-10-01 03:13:13.587 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 01, 2022 3:13:14 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-01 03:13:14.577 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.164 seconds (JVM running for 11.198) Oct 01, 2022 3:13:34 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-01 03:13:46.581 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 03:13:46.600 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 03:13:46.649 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-01 03:13:46.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 03:13:46.678 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-01 03:13:46.681 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 03:13:46.682 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 03:13:46.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 03:13:46.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 03:13:46.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 03:13:46.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 03:13:46.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 03:13:46.750 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 03:13:46.761 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 03:13:46.761 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 03:13:46.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 03:13:47.898 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 03:13:47.903 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 03:13:47.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 03:13:47.906 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 03:13:47.922 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 03:13:47.925 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 03:13:47.926 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 03:13:47.927 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 03:13:47.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 03:13:47.950 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 03:13:47.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 03:13:47.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 03:13:47.966 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 03:13:47.966 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 03:13:47.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 03:13:47.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 03:13:48.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:45:a8:5b:0c:8f:b7:98:f2:92:09:11:d9:c2:1f:63:81:6c:21:45] modulus: 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 public exponent: 10001 ] 2022-10-01 04:26:25.766 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:26:25.769 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:26:25.773 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-01 04:26:25.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:26:25.788 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-01 04:26:25.790 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:26:25.791 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:26:25.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:26:25.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:26:25.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:26:25.829 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:26:25.833 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:26:25.836 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:26:25.837 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:26:26.077 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:26:26.081 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:26:26.081 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:26:26.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:26:26.091 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:26:26.093 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:26:26.094 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:26:26.095 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:26:26.096 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:26:26.098 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:26:26.098 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:26:26.099 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:26:26.101 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:26:26.102 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:26:26.103 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:26:26.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:26:26.117 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:67:9b:db:a4:f0:70:f3:12:d4:92:37:bf:0a:c0:c7:d6:cf:ad:ad] modulus: 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 public exponent: 10001 ] 2022-10-01 04:28:14.126 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:28:14.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:28:14.129 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-01 04:28:14.130 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:28:14.131 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-01 04:28:14.131 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:28:14.132 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:28:14.132 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:28:14.132 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:28:14.134 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:28:14.156 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:28:14.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:28:14.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:28:14.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:28:14.296 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:28:14.296 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:28:14.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:28:14.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:28:14.300 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:28:14.301 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:28:14.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:28:14.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:28:14.302 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:28:14.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:28:14.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:28:14.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:28:14.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:28:14.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:28:14.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:28:14.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:28:14.310 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:d1:17:92:04:78:10:d6:cd:24:fa:c9:a8:e6:0f:ac:cb:5d:dd:fc] modulus: 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 public exponent: 10001 ] 2022-10-01 04:29:30.318 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:29:30.319 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:29:30.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-01 04:29:30.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:29:30.327 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-01 04:29:30.328 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:29:30.328 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:29:30.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:29:30.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:29:30.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:29:30.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:29:30.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:29:30.343 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:29:30.343 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:29:30.463 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:29:30.464 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:29:30.464 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:29:30.465 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:29:30.467 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:29:30.467 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:29:30.468 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:29:30.468 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:29:30.469 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:29:30.470 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:29:30.470 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:29:30.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:29:30.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:29:30.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:29:30.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:29:30.473 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:29:30.477 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: a28103bed223b4a64fdb6e140e51088bdb5888d2543e918050172bf1ca1f11abccacabdb458951708e29ce9545f584bf716e5a7fda6df402ee730a1b16a3430f2ad5551e59a108814560a9405dac53740d0519db0282890aabf271aee736dec8f7d37e1420ebec1bee73035751d086c3eac93f1384f0a4f088e42db4e1763eb71da141a8532ed128ba4cea6b1473027201da2d3be1858eed0bf813e7daaa7f6a3dd35d5174cce645f624a5a71bb586f40168229206e11af3ec332b21749194043b801aa29da64e9cb60f6fae71ac7ddc16b6559f9ae6469e1cac2deb469fec5f19716dd7ebd62a1d2c45ed38b29c46a910438e544ccd573cef48905b5fd34254c80e6068f5245bdeacbdc30e01c74a56c14d345bf8d2c79bd4e4be07cb3c44c7d06058db46b00f101ca1c7a4ff9d105f442fc6d9f999e457d57b164efe3e0a3247f4bb125757d89a6b15cad344eb64e93f4333803c4967af834eb5bad3ac9425ee2a00223763046fea1b70946c5f421200c0449edb4b94dc2f7f2f32cfe19a6f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:6e:f7:d6:e6:38:5b:fb:4a:ca:81:83:5e:18:77:53:26:26:b3:5d] modulus: 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 public exponent: 10001 ] 2022-10-01 04:31:20.878 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:31:20.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:31:20.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-01 04:31:20.884 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:31:20.885 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-01 04:31:20.887 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:31:20.887 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:31:20.888 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:31:20.888 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:31:20.889 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:31:20.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:31:20.895 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:31:20.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:31:20.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:31:21.067 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:31:21.067 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:31:21.069 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:31:21.069 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:31:21.073 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:31:21.075 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:31:21.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:31:21.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:31:21.078 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:31:21.079 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:31:21.079 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:31:21.083 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:31:21.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:31:21.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:31:21.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:31:21.086 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:31:21.091 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:73:09:48:14:84:1d:f5:e2:73:50:26:5e:8a:e5:dd:fc:56:da:2c] modulus: d4ae363a89f82ec4af85fd11544ae6f2433190f00758032aac4621338592c9f768abf4d4f93ce184f218569724a09f27add024dfd95dc271ee4330aa54b3322e34b0389889028200981fba485481ef82fff7e376a7262394856dd945e77c6d1bed872beb05d403d55494a32e7cbf054cfb817d396de8b2ba16ef7b4902e5b95cb7eea684809abc3aeffddf1b5cdf2f862b0b2e80acb9edd8cfddff8607c7b69cc0a43bfaf2059a4b345dcb75e464239536f7b850300ea27e7640c47e11d87294224dfb6c62ca1fcc3bf9eb21657c29d530cc1349e9544dd7a02b50082dc3ee2ebfac3e4aad32d8ca61f7e67632ff4c59d83572b1e85642a1ea5d35960a9f0dbf public exponent: 10001 ] 2022-10-01 04:40:20.128 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:40:20.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:40:20.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-01 04:40:20.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:40:20.133 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-01 04:40:20.133 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:40:20.133 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:40:20.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:40:20.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:40:20.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:40:20.143 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:40:20.144 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:40:20.145 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:40:20.145 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:40:20.314 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:40:20.315 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:40:20.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:40:20.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:40:20.318 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:40:20.319 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:40:20.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:40:20.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:40:20.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:40:20.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:40:20.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:40:20.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:40:20.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:40:20.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:40:20.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:40:20.323 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:40:20.327 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:60:dc:cd:e1:ad:36:4e:d4:72:5e:21:7d:a0:e1:70:08:f7:78:e8] modulus: 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 public exponent: 10001 ] 2022-10-01 04:45:37.299 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:45:37.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:45:37.303 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-01 04:45:37.304 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:45:37.305 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-01 04:45:37.305 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:45:37.306 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:45:37.306 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:45:37.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:45:37.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:45:37.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:45:37.313 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:45:37.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:45:37.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:45:37.470 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:45:37.471 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:45:37.471 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:45:37.472 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:45:37.474 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:45:37.474 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:45:37.475 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:45:37.475 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:45:37.476 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:45:37.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:45:37.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:45:37.478 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:45:37.479 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:45:37.479 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:45:37.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:45:37.481 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:45:37.486 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: a28103bed223b4a64fdb6e140e51088bdb5888d2543e918050172bf1ca1f11abccacabdb458951708e29ce9545f584bf716e5a7fda6df402ee730a1b16a3430f2ad5551e59a108814560a9405dac53740d0519db0282890aabf271aee736dec8f7d37e1420ebec1bee73035751d086c3eac93f1384f0a4f088e42db4e1763eb71da141a8532ed128ba4cea6b1473027201da2d3be1858eed0bf813e7daaa7f6a3dd35d5174cce645f624a5a71bb586f40168229206e11af3ec332b21749194043b801aa29da64e9cb60f6fae71ac7ddc16b6559f9ae6469e1cac2deb469fec5f19716dd7ebd62a1d2c45ed38b29c46a910438e544ccd573cef48905b5fd34254c80e6068f5245bdeacbdc30e01c74a56c14d345bf8d2c79bd4e4be07cb3c44c7d06058db46b00f101ca1c7a4ff9d105f442fc6d9f999e457d57b164efe3e0a3247f4bb125757d89a6b15cad344eb64e93f4333803c4967af834eb5bad3ac9425ee2a00223763046fea1b70946c5f421200c0449edb4b94dc2f7f2f32cfe19a6f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:11:32:b7:8d:54:79:66:14:2e:e7:e2:72:79:57:b9:86:c7:8e:65] modulus: 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 public exponent: 10001 ] 2022-10-01 04:45:55.335 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-01 04:45:55.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-01 04:45:55.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-01 04:45:55.338 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-01 04:45:55.339 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-01 04:45:55.339 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-01 04:45:55.340 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-01 04:45:55.340 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-01 04:45:55.340 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-01 04:45:55.341 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-01 04:45:55.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-01 04:45:55.346 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:45:55.346 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-01 04:45:55.347 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:45:55.482 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-01 04:45:55.483 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-01 04:45:55.484 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-01 04:45:55.484 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-01 04:45:55.486 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-01 04:45:55.487 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-01 04:45:55.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:45:55.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:45:55.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:45:55.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:45:55.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:45:55.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:45:55.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-01 04:45:55.493 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-01 04:45:55.493 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-01 04:45:55.494 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-01 04:45:55.499 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509261373272911816219633336970917197051442135296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 01 03:10:40 UTC 2022 Final Date: Thu Sep 30 03:10:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4 e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e fec35b86d3810ead31b5a4ba56e5fee13e27cd01 b62dc676713a4eef94ad9d8c12a5724c6c071a0f adc263ac9b6322be0d5a9066019920a49503aabf a4b5c070143d849b5d99e9bc84a57450fc6ae2ec 8d3e8973c79d2e24f3d2f967d664109633692fc0 177f6f656eeb182bf2c60407808a922de6354e93 eeb008c7b71e273ada4362c4ccff956733e53b0f adc415ff786004b696c4b54282ac04c779a1a58f 11e7e3a8651e07aef489855316b1dc28a18b8c90 4b8ee83814de92fbcb5aa6e594b55fc73e1109ab 8678a47359c9cce97f120579e97d06a16542516b 5fdfa17286c617fa32f4ea226ffd18e60394362d 59c9402f9f641f74bcaba99198faf446ec7a0755 4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec f07722e9bf9d0ffa309730c341fa63c0e7747e28 b898a4674e0f83dbeeb33e65fb3f6d89b70872c2 2bf0de6622d8933bd3f6c38a54a96cd02af326aa e1cd92d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:e8:f7:ec:51:ed:31:a9:74:49:a0:c9:2d:fe:92:9d:08:c1:d3:c4] modulus: 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 public exponent: 10001 ]