By type
2022-12-15 02:54:47,654 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-15 02:54:48,533 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-15 02:54:49.266 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 15, 2022 2:54:51 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 15, 2022 2:54:51 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 15, 2022 2:54:51 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 15, 2022 2:54:51 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-15 02:54:51.673 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-15 02:54:51.982 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-15 02:54:52.176 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-15 02:54:52.964 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-15 02:54:52.966 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-12-15 02:54:52.967 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-15 02:54:52.971 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-15 02:54:53.007 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-15 02:54:53.015 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-15 02:54:53.131 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-15 02:54:53.899 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 15, 2022 2:54:54 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-15 02:54:54.859 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.047 seconds (JVM running for 9.753) Dec 15, 2022 2:55:25 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-15 02:55:53.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 02:55:53.978 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 02:55:54.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-15 02:55:54.022 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 02:55:54.039 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-15 02:55:54.042 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 02:55:54.042 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 02:55:54.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 02:55:54.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 02:55:54.048 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 02:55:54.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 02:55:54.060 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 02:55:54.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 02:55:54.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 02:55:54.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 02:55:54.141 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 02:55:54.954 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 02:55:54.957 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 02:55:54.957 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 02:55:54.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 02:55:54.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 02:55:54.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 02:55:54.970 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 02:55:54.971 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 02:55:54.971 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 02:55:54.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 02:55:54.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 02:55:54.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 02:55:54.998 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 02:55:54.999 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 02:55:54.999 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 02:55:55.000 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 02:55:55.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:31:3d:9e:ca:89:2a:0f:69:2a:f4:78:f5:83:8c:a5:b5:6f:eb:cd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-15 04:29:11.706 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:29:11.710 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:29:11.715 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-15 04:29:11.716 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:29:11.717 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-15 04:29:11.718 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:29:11.718 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:29:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:29:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:29:11.720 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:29:11.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:29:11.726 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:29:11.726 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:29:11.727 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:29:12.021 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:29:12.022 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:29:12.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:29:12.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:29:12.027 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:29:12.028 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:29:12.029 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:29:12.029 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:29:12.030 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:29:12.032 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:29:12.032 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:29:12.033 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:29:12.034 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:29:12.035 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:29:12.035 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:29:12.037 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:29:12.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:f7:7f:bc:f3:c6:79:fc:ab:bf:41:f2:dd:86:08:73:a6:60:53:42],[56:66:d1:a4] modulus: d40adb21f28cf20c75960e0dfb1210d447895251d41fc3ef7e3e95d44a60db97ff0cc6222be7cfda4b769d6318bdf2c49ff6a91b38705ccff030b1774ccaafe3828ea56d9b6cd402b352bb12d5ddd9fc8c24cb8afa61c33504ba73adc6f5271d2e7fc27491550a35b07b47930732e4219f5ee0d50d8a45d66026656c7e696e96fbc906885e49ee17d9a06d3fa7c853287e21ccc1b5077b6cfe226a61395cedb7fb1d2da29d086a7bdd76f077b49cb8a87f8007caabce71ee8ec300169f5063ff44b2138664e6895f6db42d67c40c09845f739553a61997f95392336d934f29526cd50122f6f711acc8d2feb4037cc92c6a962506cf45de254321e726c48d5829 public exponent: 10001 ] 2022-12-15 04:30:59.771 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:30:59.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:30:59.774 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-15 04:30:59.775 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:30:59.776 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-15 04:30:59.776 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:30:59.777 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:30:59.777 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:30:59.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:30:59.779 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:30:59.784 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:30:59.784 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:30:59.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:30:59.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:30:59.963 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:30:59.965 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:30:59.965 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:30:59.965 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:30:59.968 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:30:59.968 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:30:59.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:30:59.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:30:59.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:30:59.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:30:59.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:30:59.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:30:59.972 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:30:59.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:30:59.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:30:59.975 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:30:59.978 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:41:ca:0e:15:2b:de:47:f1:4d:46:59:9e:e8:b9:71:e4:c5:79:3b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-15 04:32:38.113 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:32:38.117 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:32:38.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-15 04:32:38.121 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:32:38.131 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-15 04:32:38.134 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:32:38.135 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:32:38.135 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:32:38.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:32:38.138 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:32:38.144 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:32:38.145 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:32:38.146 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:32:38.146 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:32:38.315 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:32:38.316 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:32:38.317 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:32:38.317 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:32:38.322 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:32:38.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:32:38.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:32:38.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:32:38.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:32:38.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:32:38.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:32:38.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:32:38.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:32:38.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:32:38.338 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:32:38.340 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:32:38.348 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: c9155f93a1be53c7ed6568826749bdecfcd5669f6d75813afa8edcdaca37c1be259b9840f12c14826ed36675b1a7c5fe9b640c27e9c0a3d4e3f30a4cf1aafd803f9d92f65a70a90c86b6afd0764f0332fe7201402cd2d1c357856fa834ce0a02b37918bce824be41b94b66994ee784d7eb6c63b4152cac81230dc19edaa0036440d5b6d9c949a8fcba7bcd18c0c128a0d3d6e13bc4a00636a1f6e84e55753b99e666557c4f788ad7a1cb4126c113026884a8259f2f82fe01cecb5060221642806a71c4fcab99b803b94c790eec0ebe843611c2d400cf92d7ecb7fbe85ac46be1dcb445d00a81415349e00aef3efd7a25e45db2a62a87b973f686e980d4be62d10c272d8c09c016e35676abac7a63589c0e76415bb7f0b12c7c982ebe1a1d5f4f61df97f02756ff051aae0ab1165b19ad19684aea16d570f3f075315037786fec60f07d3d82b08b16e7511760982dd9dffa92ac2d222537ad3d69ae7246f42383221688e6027af0d5f7d63c6468c2c0f4143695b562a202033bc363b34bd29bc1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:6e:ac:05:fa:36:49:b5:dc:0e:6c:d9:c8:9d:25:51:44:9f:de:94],[56:66:d1:a4] modulus: 9a920b9b1c2fd62fe14d7a4c6b47cf18272d6386259eb395048c290640612214e8efac4841cdac5858fd68c14ea325c502d51a4fd32d73693046498716f42ae655bcbfd28c789f3af507e9df125debeb8ca3b9e3b2e9d0e3c74e713886d6f203808cdfd1f8164efb33701e7ed3c796a895c95e89f9713d847fc6b71bb896c7716f0fff554d4a1a9ffa3907dca694fccaa7cef6cac35e8f7c0f9034983645e58e2b2d73fd178c735d9db41b6ae68ff7e4e9b061d2bf0ed784128d61489122398518c0276a35aa1367e2ae58dd881b7e435ea2a49525f999f01f951670133d320566e91bd3eff174545fc466a1100d47027b9a8b90411e55a77360ad5a93bf3477 public exponent: 10001 ] 2022-12-15 04:35:31.460 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:35:31.462 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:35:31.464 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-15 04:35:31.465 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:35:31.465 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-15 04:35:31.466 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:35:31.467 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:35:31.468 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:35:31.469 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:35:31.469 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:35:31.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:35:31.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:35:31.474 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:35:31.474 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:35:32.733 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:35:32.734 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:35:32.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:35:32.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:35:32.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:35:32.736 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:35:32.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:35:32.737 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:35:32.737 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:35:32.738 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:35:32.738 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:35:32.738 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:35:32.739 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:35:32.739 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:35:32.739 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:35:32.740 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:35:32.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:31:5a:99:c3:6e:bd:ec:f6:7b:97:09:9d:ab:94:da:a3:a9:0d:e2],[56:66:d1:a4] modulus: ca9df567e910b51f0ef7c5335043da2dde711de6843ecdf44e073778b61f915aa7fd962925df14b0f66eb4c7bc46d935710ac9ea0fcdb1514a0251c0e7ac56c1792c24322f1610571c44be449c2d6c3c6e7d5d7aa086df270f96a839ae70e45ca27adb2c2feaac3a1b31f6666ebbd3cdb7e101a114b2c373a8a3ba558c7004d79ffc2a20bb6d64d07daae9d2d5a869bd33b4384a5d419e9b6713cf46c2144cce58a88bb60d5a75a6a0ed35e4094edd964161038687664e5d8580a28c9198b33a3f815333fd60de955e8cf5e2a1ef678f600383ff0e83f9140c0f53fe2c793840d9f08c12bd52a39054c1ba718e76aef2d7d85d2a15933d724298e8a3ee38b1bd public exponent: 10001 ] 2022-12-15 04:43:48.256 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:43:48.259 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:43:48.262 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-15 04:43:48.263 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:43:48.264 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-15 04:43:48.264 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:43:48.265 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:43:48.265 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:43:48.266 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:43:48.266 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:43:48.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:43:48.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:43:48.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:43:48.274 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:43:48.456 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:43:48.457 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:43:48.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:43:48.458 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:43:48.459 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:43:48.459 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:43:48.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:43:48.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:43:48.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:43:48.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:43:48.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:43:48.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:43:48.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:43:48.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:43:48.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:43:48.465 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:43:48.468 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:5f:30:d1:3b:d2:ba:94:f8:5e:ad:d7:7e:bd:0b:20:f4:da:fd:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-15 04:49:16.773 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:49:16.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:49:16.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-15 04:49:16.780 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:49:16.781 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-15 04:49:16.781 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:49:16.782 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:49:16.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:49:16.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:49:16.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:49:16.788 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:49:16.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:49:16.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:49:16.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:49:16.942 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:49:16.943 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:49:16.943 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:49:16.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:49:16.945 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:49:16.946 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:49:16.946 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:49:16.947 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:49:16.947 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:49:16.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:49:16.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:49:16.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:49:16.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:49:16.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:49:16.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:49:16.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:49:16.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:77:bc:28:7a:85:ce:50:45:38:fd:1f:73:8c:3e:37:bf:2d:97:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-15 04:49:31.623 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 04:49:31.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 04:49:31.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-15 04:49:31.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 04:49:31.627 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-15 04:49:31.627 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 04:49:31.628 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 04:49:31.628 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 04:49:31.629 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 04:49:31.629 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 04:49:31.633 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 04:49:31.633 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:49:31.634 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 04:49:31.634 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:49:31.820 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 04:49:31.821 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 04:49:31.821 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 04:49:31.821 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 04:49:31.822 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 04:49:31.823 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 04:49:31.823 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:49:31.823 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:49:31.824 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:49:31.824 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:49:31.825 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:49:31.825 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:49:31.825 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 04:49:31.826 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 04:49:31.826 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 04:49:31.827 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 04:49:31.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: c9155f93a1be53c7ed6568826749bdecfcd5669f6d75813afa8edcdaca37c1be259b9840f12c14826ed36675b1a7c5fe9b640c27e9c0a3d4e3f30a4cf1aafd803f9d92f65a70a90c86b6afd0764f0332fe7201402cd2d1c357856fa834ce0a02b37918bce824be41b94b66994ee784d7eb6c63b4152cac81230dc19edaa0036440d5b6d9c949a8fcba7bcd18c0c128a0d3d6e13bc4a00636a1f6e84e55753b99e666557c4f788ad7a1cb4126c113026884a8259f2f82fe01cecb5060221642806a71c4fcab99b803b94c790eec0ebe843611c2d400cf92d7ecb7fbe85ac46be1dcb445d00a81415349e00aef3efd7a25e45db2a62a87b973f686e980d4be62d10c272d8c09c016e35676abac7a63589c0e76415bb7f0b12c7c982ebe1a1d5f4f61df97f02756ff051aae0ab1165b19ad19684aea16d570f3f075315037786fec60f07d3d82b08b16e7511760982dd9dffa92ac2d222537ad3d69ae7246f42383221688e6027af0d5f7d63c6468c2c0f4143695b562a202033bc363b34bd29bc1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:a2:52:8f:7d:a0:c0:59:13:7c:66:6a:1f:d4:c7:3a:01:8d:23:b6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-15 05:11:58.993 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 05:11:58.997 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 05:11:59.000 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-15 05:11:59.001 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 05:11:59.004 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-15 05:11:59.005 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 05:11:59.005 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 05:11:59.005 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 05:11:59.006 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 05:11:59.006 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 05:11:59.011 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 05:11:59.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 05:11:59.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 05:11:59.013 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 05:11:59.202 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 05:11:59.203 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 05:11:59.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 05:11:59.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 05:11:59.205 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 05:11:59.205 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 05:11:59.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 05:11:59.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 05:11:59.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 05:11:59.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 05:11:59.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 05:11:59.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 05:11:59.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 05:11:59.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 05:11:59.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 05:11:59.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 05:11:59.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:9d:bd:b6:a1:9d:94:8f:c9:e2:5c:5a:80:b8:22:e4:da:c9:b2:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-15 05:12:05.962 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-15 05:12:05.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-15 05:12:05.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-15 05:12:05.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-15 05:12:05.967 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-15 05:12:05.968 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-15 05:12:05.968 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-15 05:12:05.968 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-15 05:12:05.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-15 05:12:05.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-15 05:12:05.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-15 05:12:05.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 05:12:05.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-15 05:12:05.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 05:12:06.106 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-15 05:12:06.107 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-15 05:12:06.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-15 05:12:06.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-15 05:12:06.109 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-15 05:12:06.109 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-15 05:12:06.109 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 05:12:06.109 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 05:12:06.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 05:12:06.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 05:12:06.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 05:12:06.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 05:12:06.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-15 05:12:06.112 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-15 05:12:06.112 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-15 05:12:06.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-15 05:12:06.115 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 150760518874837752485695637097960828890440341074 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 15 02:50:57 UTC 2022 Final Date: Tue Dec 14 02:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:ff:23:ef:2c:c9:d0:4a:46:37:04:f3:a9:81:33:c2:d5:4f:c9:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 600ea1430c55997febbd082d17dd1f894a1c9a05 6716db1363d28d115816e6bc650615779c563c85 8d34a14cc374e927ad7f109931da3f897bd3c7ac 8b256faf953c5f1b0e44e7f290bdf0b21b99bf08 99fa293b638499ce06c143d12f718843983f1666 6b370332a549d4b07ce7eea1e83fde6dc8e92dd7 cd53e1c270b057736bfb79638e1c9ad2b3d4c0f8 faf21d46fd12ebda1325ddfcffdc11da5e134305 5cc07e4eb07473162df275fc15fd64a055ce9da6 9eac9db4ba9c8c428b7a96cedd212d9ed2d63ffc df848573ade2722f1346a1fb037ab6c1ca99cbfc 7006637bdc86c1896f8bbb13a84a2cfdd2205586 5c3423809b3c9e3a76cf8f5f1f47ab9dc7862585 231b7337ce0e22e151d69c1cfcd0cf5dd49306e9 fa358c1439cfc9bd5e445becd9f942bcc60cb975 09abb79a8fb5766131e5a0f72571edbda4534a78 305004a94b65f872538dc04b524a9c87e78a7f84 5410e61e4c349c71e6545fffc3557a93a337bdaf 968ce0f7463429f70a636f558731e0c5049c8216 47672ee6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:f9:0c:02:a9:3f:ee:54:11:11:3b:5f:9d:03:15:2e:c9:dc:c8:14],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]