By type
2022-11-13 02:57:17,807 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-13 02:57:19,324 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-13 02:57:20.305 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 13, 2022 2:57:22 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 13, 2022 2:57:22 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 13, 2022 2:57:22 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 13, 2022 2:57:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-13 02:57:23.334 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-13 02:57:23.688 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-13 02:57:23.864 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-13 02:57:24.685 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-13 02:57:24.688 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-13 02:57:24.689 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-13 02:57:24.693 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-13 02:57:24.739 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-13 02:57:24.743 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-13 02:57:24.883 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-13 02:57:25.434 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 13, 2022 2:57:26 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-13 02:57:26.352 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.429 seconds (JVM running for 11.295) Nov 13, 2022 2:57:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-13 02:58:15.724 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 02:58:15.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 02:58:15.787 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-13 02:58:15.792 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 02:58:15.827 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-13 02:58:15.830 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 02:58:15.832 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 02:58:15.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 02:58:15.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 02:58:15.838 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 02:58:15.845 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 02:58:15.848 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 02:58:15.889 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 02:58:15.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 02:58:15.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 02:58:15.898 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 02:58:16.534 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 02:58:16.537 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 02:58:16.537 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 02:58:16.539 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 02:58:16.549 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 02:58:16.550 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 02:58:16.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 02:58:16.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 02:58:16.552 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 02:58:16.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 02:58:16.564 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 02:58:16.564 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 02:58:16.572 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 02:58:16.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 02:58:16.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 02:58:16.575 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 02:58:16.608 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:6f:69:05:7f:24:bc:5b:a8:3c:f3:97:cc:53:39:53:c4:02:b7:71] modulus: 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 public exponent: 10001 ] 2022-11-13 04:18:16.887 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:18:16.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:18:16.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 04:18:16.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:18:16.897 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 04:18:16.897 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:18:16.898 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:18:16.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:18:16.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:18:16.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:18:16.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:18:16.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:18:16.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:18:16.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:18:17.119 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:18:17.120 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:18:17.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:18:17.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:18:17.123 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:18:17.124 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:18:17.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:18:17.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:18:17.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:18:17.126 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:18:17.127 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:18:17.127 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:18:17.128 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:18:17.128 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:18:17.129 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:18:17.130 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:18:17.135 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:00:e9:5e:26:bf:61:81:5c:a9:00:e3:78:e4:1f:4b:63:01:d1:0d] modulus: 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 public exponent: 10001 ] 2022-11-13 04:19:49.252 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:19:49.255 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:19:49.259 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-13 04:19:49.260 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:19:49.261 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-13 04:19:49.262 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:19:49.263 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:19:49.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:19:49.264 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:19:49.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:19:49.275 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:19:49.276 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:19:49.276 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:19:49.277 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:19:49.418 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:19:49.419 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:19:49.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:19:49.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:19:49.423 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:19:49.423 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:19:49.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:19:49.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:19:49.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:19:49.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:19:49.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:19:49.428 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:19:49.430 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:19:49.430 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:19:49.431 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:19:49.433 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:19:49.441 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:ec:12:81:a7:fd:89:c9:fc:65:5c:0d:17:10:fa:e2:69:fa:1f:13] modulus: b301efcc9cd9e89bee021065380c07477c34cd23b28fbd52a7bfe0640456e08da68a39e712fdfb387adfd38eddafe999430b55a78b1b53697eed021b29952ca22975b7e6b85616520ff744af3b05b0fba94e53f6c6f0ba956d5dbad3fabbd35361f965fc784a1bbab03430b24b922750619d4802a1aff1cd0844a12ffcb43be272506c5436074dd73f0d2fdafd331d588fd8bbd39c442767938691854020a6ef2faa55d8751ab845490f690bf2dc64ab132fb7c55d427bc863af67616515fb0173dbfc6961bde7e5472d67c63b7eb5b33abc57d71eeef57a4373f0794ed1e10491832e0ea3a4b8eccee089ba546dfeaba9199301337ccd712cc606dbde38997b public exponent: 10001 ] 2022-11-13 04:20:59.023 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:20:59.027 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:20:59.032 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-13 04:20:59.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:20:59.037 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-13 04:20:59.040 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:20:59.042 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:20:59.053 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:20:59.053 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:20:59.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:20:59.066 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:20:59.067 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:20:59.067 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:20:59.068 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:20:59.186 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:20:59.187 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:20:59.188 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:20:59.188 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:20:59.191 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:20:59.191 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:20:59.192 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:20:59.193 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:20:59.193 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:20:59.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:20:59.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:20:59.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:20:59.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:20:59.197 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:20:59.197 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:20:59.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:20:59.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:ec:25:92:46:dd:e4:f6:3a:b3:e6:a1:d8:e9:d7:5d:4a:fe:28:7c] modulus: ebcbafb8fd645a9718bcdc0efce53dc44ba9e21657de1b4b034778e447a76a13e4610a118d41fffa2db4f7b32b6a83ca4c7be8fe147987334291946c8bbd285193d18d18d6f06eb20d2c53cabfdf11a62e64a605a0d13149f0692496812cda7c1365c0b01dc7e1403acf667ac8cbd1f57efd2ff3eeecd72c3ea809138b3c229172a270f726893a97ae78cd369293d10b4db57d03f3ec15ec7c5746317017e9425f5f3f422d42bc2a518929b03243c905346ddb6f7bb203e03847570a4ae20e2d50a6b6cd2118ebfd4abd64d4c2c4ba497128d75b5d0137f1efd9a8ee05b2fb8bee0f4d789cb59a282c39cc450fb93e6392b37014b735d9fe8ef734bff0c65859 public exponent: 10001 ] 2022-11-13 04:23:08.297 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:23:08.300 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:23:08.303 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 04:23:08.304 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:23:08.305 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 04:23:08.306 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:23:08.307 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:23:08.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:23:08.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:23:08.309 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:23:08.318 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:23:08.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:23:08.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:23:08.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:23:08.500 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:23:08.501 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:23:08.501 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:23:08.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:23:08.504 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:23:08.505 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:23:08.505 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:23:08.506 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:23:08.506 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:23:08.507 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:23:08.508 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:23:08.508 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:23:08.509 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:23:08.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:23:08.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:23:08.512 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:23:08.517 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:01:8d:71:ca:6a:30:f9:62:c8:22:9d:1c:54:11:1e:43:b4:f8:63] modulus: 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 public exponent: 10001 ] 2022-11-13 04:31:34.691 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:31:34.695 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:31:34.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-13 04:31:34.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:31:34.700 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-13 04:31:34.701 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:31:34.702 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:31:34.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:31:34.703 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:31:34.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:31:34.711 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:31:34.713 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:31:34.713 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:31:34.713 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:31:34.888 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:31:34.890 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:31:34.891 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:31:34.891 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:31:34.893 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:31:34.894 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:31:34.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:31:34.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:31:34.897 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:31:34.899 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:31:34.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:31:34.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:31:34.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:31:34.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:31:34.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:31:34.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:31:34.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:1f:67:0f:f1:ff:57:a2:03:20:35:3f:7c:b3:0e:82:bd:b2:4f:86] modulus: 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 public exponent: 10001 ] 2022-11-13 04:36:50.123 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:36:50.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:36:50.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-13 04:36:50.126 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:36:50.127 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-13 04:36:50.128 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:36:50.128 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:36:50.128 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:36:50.129 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:36:50.129 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:36:50.134 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:36:50.134 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:36:50.135 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:36:50.135 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:36:50.324 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:36:50.324 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:36:50.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:36:50.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:36:50.326 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:36:50.327 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:36:50.327 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:36:50.327 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:36:50.328 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:36:50.328 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:36:50.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:36:50.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:36:50.330 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:36:50.330 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:36:50.330 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:36:50.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:36:50.334 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:84:5d:f4:5a:45:75:16:f2:2a:75:11:9f:62:cf:83:89:48:aa:eb] modulus: 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 public exponent: 10001 ] 2022-11-13 04:37:02.661 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 04:37:02.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 04:37:02.665 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-13 04:37:02.666 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 04:37:02.666 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-13 04:37:02.667 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 04:37:02.668 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 04:37:02.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 04:37:02.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 04:37:02.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 04:37:02.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 04:37:02.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:37:02.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 04:37:02.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:37:02.803 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 04:37:02.804 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 04:37:02.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 04:37:02.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 04:37:02.806 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 04:37:02.807 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 04:37:02.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:37:02.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:37:02.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:37:02.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:37:02.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:37:02.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:37:02.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 04:37:02.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 04:37:02.811 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 04:37:02.812 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 04:37:02.815 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 659750224579042219621424266170668539361134684704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 02:54:49 UTC 2022 Final Date: Fri Nov 12 02:54:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f b5f9c0209b25abf3fdfaa863a89e7e3ab8572958 5d216effce3a91103446b3fb2bcfa9328a8fff2a 98ce10007ad72d5d1f7664e49c0e7fa371919889 54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a dd00327aaff70c07826bd14c42a6f8089e02f337 93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b 7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5 3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b 9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5 13c1ef94d174951eaf19204d4f4b450956a0ecdf 050efab7d209659caed5fd7bf892001dd0a93f8d e14cd2015944e53e5e8233ce4bbf97c97e275358 917cfad68610e4800d540b70a604ebf1d1ffb65c dfcf8654311e8e31d63a7d281fa8cbd6c651d15c bfddfbea6f787ce7a02fbd6601086df00784a481 6b48ac450814873f11af203f1771362049a2dea2 9b437436afe8b808e5bb6be42b5635b4e3952421 fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f 465a6b7c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:19:d5:e6:bf:71:bc:65:ed:d0:3a:34:96:3f:c5:08:bd:cd:a6:fb] modulus: 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 public exponent: 10001 ]