By type
2022-05-05 05:03:51,052 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-05 05:03:51,947 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-05 05:03:52.614 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 05, 2022 5:03:54 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 05, 2022 5:03:54 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 05, 2022 5:03:54 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 05, 2022 5:03:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-05 05:03:54.989 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-05 05:03:55.265 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-05 05:03:55.438 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-05 05:03:56.167 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-05 05:03:56.170 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-05 05:03:56.171 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-05 05:03:56.175 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-05 05:03:56.214 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-05 05:03:56.217 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-05 05:03:56.343 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-05 05:03:56.922 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 05, 2022 5:03:57 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-05 05:03:57.900 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.638 seconds (JVM running for 9.533) May 05, 2022 5:04:19 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-05 05:04:50.087 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 05:04:50.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 05:04:50.144 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-05 05:04:50.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 05:04:50.165 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-05 05:04:50.167 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 05:04:50.168 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 05:04:50.169 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 05:04:50.170 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 05:04:50.174 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 05:04:50.182 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 05:04:50.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 05:04:50.234 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 05:04:50.239 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 05:04:50.240 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 05:04:50.245 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 05:04:50.819 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 05:04:50.822 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 05:04:50.822 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 05:04:50.824 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 05:04:50.834 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 05:04:50.835 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 05:04:50.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 05:04:50.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 05:04:50.837 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 05:04:50.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 05:04:50.850 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 05:04:50.850 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 05:04:50.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 05:04:50.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 05:04:50.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 05:04:50.858 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 05:04:50.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:2b:99:c5:a0:bd:17:3f:d2:82:25:2c:1e:b5:26:75:60:5e:9b:31] modulus: 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 public exponent: 10001 ] 2022-05-05 06:16:41.611 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:16:41.615 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:16:41.631 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-05 06:16:41.639 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:16:41.640 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-05 06:16:41.641 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:16:41.641 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:16:41.642 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:16:41.643 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:16:41.644 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:16:41.661 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:16:41.663 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:16:41.664 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:16:41.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:16:41.830 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:16:41.831 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:16:41.831 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:16:41.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:16:41.835 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:16:41.835 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:16:41.836 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:16:41.837 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:16:41.837 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:16:41.838 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:16:41.839 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:16:41.839 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:16:41.840 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:16:41.840 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:16:41.841 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:16:41.842 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:16:41.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:56:03:44:0e:a2:46:8b:ff:08:ae:7a:39:2d:70:f2:ef:f1:42:c7] modulus: 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 public exponent: 10001 ] 2022-05-05 06:21:03.574 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:21:03.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:21:03.581 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-05 06:21:03.582 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:21:03.583 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-05 06:21:03.584 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:21:03.584 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:21:03.585 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:21:03.585 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:21:03.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:21:03.593 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:21:03.594 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:21:03.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:21:03.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:21:03.811 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:21:03.812 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:21:03.812 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:21:03.813 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:21:03.815 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:21:03.816 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:21:03.816 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:21:03.817 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:21:03.817 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:21:03.818 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:21:03.819 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:21:03.819 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:21:03.820 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:21:03.820 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:21:03.821 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:21:03.822 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:21:03.827 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: e63a32a1ca256b9eb2cb951fe99a64d62fc7ea0cea3e67d74643dfa7e9913abd73ca99b9cfa014caaacdc8b1eef39bf325f6f98930730a29d040291df7efbc5f815908f7b3c89d12633f38c76de43b7d79df39137b2eb76c1bf965ad209f064756d6bc697baa4d3ca4f1f76a852bf2642921fc33424771d996e053840e922c22d8eaa7c46626f6fce545ace41363e9fee438eba80c8d12f1da77b309ad55b96a9693d7930bb6235d865283656cb9da018a51ae60ea94f1dde6d1b542175aa4553901c463eadbd7692594952bfae0c8b5f0b01bc26d4550b401d0669322e59a723340484a5529aeb804bbe0870abe2353b70108c55ea4806e1431cf5f5c6834dc877ddc7939528c3d95b0d4343c118f7b6791c523356feb910bd06df4c72cd2c1ed77795dcfe4e13765d12e5a7ae2ae0abcb188a817581ecf7aa3d0ac5fbaba285f600a74e2982423330f765ae2043f6b3c07769ed5edface8cecd4646dc886c83a72a412026cde06ded2205805fd3a9d21ce976f14fb5af5a82622305729aa39 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:68:fd:39:c4:20:7a:5f:01:79:2f:1d:62:4b:c0:0a:dc:e5:ae:5b] modulus: b68585646a1006ea126ad907e393e8242b12add50e190c45c4cc92ae7d380bf00971f237f495e32489db5ef9a7cac2c7cf4a8106084e44fcfffb3f56945692f917fec0f9d1635c55abc8fc991e9f109507f926f39faa2f32f609b58c4d7615ff9c923c2974ff70557e56f14ebc2247d0be008a16f8db5c0d420d2c89cae74242ccf6c8310ee4b8df62ac5329f92d50854b52c2a22cca2c6b73bad6f0888ed9946c59ef255a4c09894b26388244c06c507bffe953192dfef1f0608353a46909a8d6dbead95c0cb663c4e4de236d4982c5b5e325f626df9f17909d09c07d4d52d09af4542ac9a17a843570d32c0bb0647b04bd81e2389f0a3c5e9754d139d8eb0f public exponent: 10001 ] 2022-05-05 06:21:59.655 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:21:59.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:21:59.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-05 06:21:59.658 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:21:59.659 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-05 06:21:59.659 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:21:59.660 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:21:59.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:21:59.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:21:59.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:21:59.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:21:59.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:21:59.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:21:59.667 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:21:59.800 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:21:59.800 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:21:59.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:21:59.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:21:59.803 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:21:59.804 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:21:59.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:21:59.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:21:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:21:59.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:21:59.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:21:59.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:21:59.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:21:59.813 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:f3:1a:79:7b:3c:e9:2a:c3:f2:bf:43:40:3b:16:f8:eb:d6:b5:19] modulus: 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 public exponent: 10001 ] 2022-05-05 06:22:18.444 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:22:18.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:22:18.447 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-05 06:22:18.448 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:22:18.448 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-05 06:22:18.449 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:22:18.449 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:22:18.450 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:22:18.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:22:18.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:22:18.456 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:22:18.457 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:22:18.457 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:22:18.458 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:22:18.624 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:22:18.625 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:22:18.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:22:18.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:22:18.628 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:22:18.629 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:22:18.630 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:22:18.630 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:22:18.631 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:22:18.631 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:22:18.632 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:22:18.632 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:22:18.633 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:22:18.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:22:18.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:22:18.635 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:22:18.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:2a:e1:fc:a2:96:39:74:61:f1:05:41:e9:08:58:d6:c4:f0:74:9b] modulus: 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 public exponent: 10001 ] 2022-05-05 06:22:45.183 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:22:45.184 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:22:45.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-05 06:22:45.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:22:45.186 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-05 06:22:45.187 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:22:45.187 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:22:45.188 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:22:45.188 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:22:45.189 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:22:45.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:22:45.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:22:45.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:22:45.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:22:45.330 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:22:45.330 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:22:45.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:22:45.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:22:45.333 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:22:45.333 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:22:45.333 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:22:45.334 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:22:45.334 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:22:45.335 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:22:45.335 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:22:45.336 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:22:45.336 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:22:45.337 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:22:45.337 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:22:45.338 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:22:45.342 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: e63a32a1ca256b9eb2cb951fe99a64d62fc7ea0cea3e67d74643dfa7e9913abd73ca99b9cfa014caaacdc8b1eef39bf325f6f98930730a29d040291df7efbc5f815908f7b3c89d12633f38c76de43b7d79df39137b2eb76c1bf965ad209f064756d6bc697baa4d3ca4f1f76a852bf2642921fc33424771d996e053840e922c22d8eaa7c46626f6fce545ace41363e9fee438eba80c8d12f1da77b309ad55b96a9693d7930bb6235d865283656cb9da018a51ae60ea94f1dde6d1b542175aa4553901c463eadbd7692594952bfae0c8b5f0b01bc26d4550b401d0669322e59a723340484a5529aeb804bbe0870abe2353b70108c55ea4806e1431cf5f5c6834dc877ddc7939528c3d95b0d4343c118f7b6791c523356feb910bd06df4c72cd2c1ed77795dcfe4e13765d12e5a7ae2ae0abcb188a817581ecf7aa3d0ac5fbaba285f600a74e2982423330f765ae2043f6b3c07769ed5edface8cecd4646dc886c83a72a412026cde06ded2205805fd3a9d21ce976f14fb5af5a82622305729aa39 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:1b:01:84:7f:89:ca:ad:ac:29:ad:83:ff:84:03:8a:c0:fb:17:82] modulus: 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 public exponent: 10001 ] 2022-05-05 06:23:50.801 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:23:50.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:23:50.807 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-05 06:23:50.813 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:23:50.814 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-05 06:23:50.815 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:23:50.816 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:23:50.817 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:23:50.818 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:23:50.818 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:23:50.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:23:50.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:23:50.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:23:50.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:23:50.971 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:23:50.972 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:23:50.973 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:23:50.973 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:23:50.976 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:23:50.976 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:23:50.977 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:23:50.977 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:23:50.977 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:23:50.978 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:23:50.979 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:23:50.980 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:23:50.981 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:23:50.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:23:50.985 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:23:50.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:23:50.990 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:f0:76:59:12:81:58:c1:ac:d8:28:86:0f:16:71:66:82:a7:a8:c2] modulus: bdcca18be746b272868f8ab39e218eb179d90fd48dca11805fb96aa6e326f4ebecb29836114d7595254437e0ded01cdbf8c0129eabbdbadd0831870d5bfcf60fc5aeda3c463c32c39e2ae9295c6315ff7c01eadce57580d9b672123f82285b2c095afeeea30e55688215928ce12bdbbcd40c18604076f605f653abbe745b9a8b400be766118673b3ae0f0e4488851168e79f766242798a99a70a43a207b661198f8c5ebe1603d5c784bd16ce230840de31b86053fe2a946326deb8e4088818a393e47f26b02d673e64fa0b581cad25ce309bd027db511357058e409581b075ecced12ab3e0b0c8eb99916aa53fd5ec250ccfa6a7acca97af379742c7a58fc641 public exponent: 10001 ] 2022-05-05 06:25:57.944 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-05 06:25:57.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-05 06:25:57.947 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-05 06:25:57.950 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-05 06:25:57.950 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-05 06:25:57.952 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-05 06:25:57.952 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-05 06:25:57.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-05 06:25:57.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-05 06:25:57.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-05 06:25:57.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-05 06:25:57.964 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:25:57.965 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-05 06:25:57.966 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:25:58.101 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-05 06:25:58.102 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-05 06:25:58.103 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-05 06:25:58.103 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-05 06:25:58.104 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-05 06:25:58.105 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-05 06:25:58.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:25:58.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:25:58.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:25:58.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:25:58.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:25:58.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:25:58.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-05 06:25:58.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-05 06:25:58.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-05 06:25:58.113 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-05 06:25:58.117 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475686868081288281715166933238628294708284280997 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 05 05:01:42 UTC 2022 Final Date: Tue May 04 05:01:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:2a:05:9f:db:87:a7:22:16:5f:a1:c9:73:44:f3:d0:7a:f9:49:fd] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 75c14dca21e6436e017e3fc85e2218c2db5380f0 6de220b3b2f35b52b122ba0eaa42ed980c7963ff b02667029111b73695fee115106fa23870b6ad3d d66ab1b7bca93e07a99ba4fcf49d7ba1e1a3732b 896854b2eae3035cef4d9a8498bd333448576e81 67a9d9fed60b213a11ddb82d29f75d3c0b96b84f 70207ed147ec555356c618d6f4e7e7275d347753 875ae717cf8b51f644ff963c372288b7eaa12006 14603033be955ee3afbbc8b96b68f7fc82c550b5 27662559889a8e1c970f68800a41842ff22ce0fa 982fab49d6b9a603ccb216ab6560f9fe2ad49d76 abb2ed7dc4d6cc8799377970b200afb3a20654d7 de235773f9acda899ee62dfae5bf5be24dc19080 7573e3be2a69a6cb43f35ba5587f89e5275b89a9 13cddd0bfe9a9c81f48ba8651cf26dad2be45a0e 61e6bb9279efd6b95dfde0d435ec24f61c5ef327 14008a48fa274d73bbe85498a1c61f4c6eb102ae 527fdca2a9f7c5965adf8a6a75e073c97aff6f6f fb58dc7699e75c5185be402024fa7161d1f6e648 a94ec872 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:ce:c4:bb:9a:69:29:2f:ae:c0:10:bf:56:4d:4c:9d:8d:85:bd:04] modulus: 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 public exponent: 10001 ]