By type
2022-05-09 12:41:48,799 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-09 12:41:49,409 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-09 12:41:49.867 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 09, 2022 12:41:51 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 09, 2022 12:41:51 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 09, 2022 12:41:51 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 09, 2022 12:41:51 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-09 12:41:51.569 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-09 12:41:51.747 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-09 12:41:51.858 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-09 12:41:52.347 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-09 12:41:52.349 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-09 12:41:52.350 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-09 12:41:52.353 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-09 12:41:52.379 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-09 12:41:52.381 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-09 12:41:52.456 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-09 12:41:52.910 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 09, 2022 12:41:53 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-09 12:41:53.503 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 5.256 seconds (JVM running for 6.44) May 09, 2022 12:42:24 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-09 12:42:42.812 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 12:42:42.818 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 12:42:42.842 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-09 12:42:42.844 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 12:42:42.854 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-09 12:42:42.856 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 12:42:42.856 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 12:42:42.857 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 12:42:42.857 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 12:42:42.859 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 12:42:42.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 12:42:42.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 12:42:42.889 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 12:42:42.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 12:42:42.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 12:42:42.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 12:42:43.317 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 12:42:43.320 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 12:42:43.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 12:42:43.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 12:42:43.332 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 12:42:43.333 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 12:42:43.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 12:42:43.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 12:42:43.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 12:42:43.343 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 12:42:43.343 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 12:42:43.343 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 12:42:43.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 12:42:43.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 12:42:43.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 12:42:43.348 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 12:42:43.367 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: cf5822af2af26398f8880aa29131650e0ef43db5b0bd2ca9afe49dbd9f49e82062361fd13fd554e565a6ac107d7d6099e8866344f004edd551e557c2c62e99e1e519c3a103cb36d45047496e22b81c9365058ff0decc3a681f17fdc68e70c71c772e1a2dc8178d3a227db84ea3e94692415ed1aeb9658a613020cecec7e22933deccbd3724517ba0f2f36609bdae9fdffb5fcd1dd87f04f2bb19d85ad1de6b5dfaeb1527661aca04358efff84b3c29212b51f3bda7d75ba2f33fff731bbcb04cd3a5b17924feb8ece36771d0631c898153e3e8622928cfff36187c212cfa187b7647475e86107b2f3d80a91dfb6c85fe9d38c31b276bc7b6fa3251088b04e662b182031d27d7b650d5b291ee89b9da78addc2a8d961e632249703b142aea74b7e57332aafe8bc33c9c66a41e1539ca752c153194c83e93c035e8b80d73dc80fd08eae79f28cc896ddb592357aa1e1e4b4917f29f328bc3ba86bbb74ad1b3ee19aaea0ff4a7c9dc7a85090941b07a39216f2bf9ef55c9e3e558700f59a8a5d83b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:18:90:20:b5:52:6a:a1:0a:a0:56:b0:ed:f0:fd:29:a3:be:49:e8] modulus: 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 public exponent: 10001 ] 2022-05-09 13:53:18.806 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:53:18.809 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:53:18.812 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-09 13:53:18.813 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:53:18.813 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-09 13:53:18.814 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:53:18.814 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:53:18.814 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:53:18.815 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:53:18.815 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:53:18.822 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:53:18.823 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:53:18.823 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:53:18.824 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:53:19.032 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:53:19.033 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:53:19.033 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:53:19.034 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:53:19.036 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:53:19.037 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:53:19.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:53:19.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:53:19.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:53:19.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:53:19.040 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:53:19.040 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:53:19.041 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:53:19.041 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:53:19.041 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:53:19.042 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:53:19.046 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:20:fa:26:30:71:c6:7f:66:78:4c:26:4b:64:79:0f:22:77:e6:ec] modulus: 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 public exponent: 10001 ] 2022-05-09 13:53:23.168 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:53:23.169 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:53:23.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-09 13:53:23.171 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:53:23.171 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-09 13:53:23.172 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:53:23.172 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:53:23.172 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:53:23.173 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:53:23.173 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:53:23.181 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:53:23.182 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:53:23.182 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:53:23.183 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:53:23.292 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:53:23.293 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:53:23.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:53:23.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:53:23.296 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:53:23.296 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:53:23.296 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:53:23.297 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:53:23.297 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:53:23.297 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:53:23.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:53:23.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:53:23.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:53:23.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:53:23.299 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:53:23.299 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:53:23.302 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:d3:4b:a2:92:06:70:bb:45:53:f6:6f:29:45:ce:cd:f3:31:60:5c] modulus: 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 public exponent: 10001 ] 2022-05-09 13:55:06.023 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:55:06.025 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:55:06.027 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-09 13:55:06.027 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:55:06.028 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-09 13:55:06.029 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:55:06.029 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:55:06.029 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:55:06.030 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:55:06.030 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:55:06.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:55:06.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:55:06.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:55:06.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:55:06.233 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:55:06.234 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:55:06.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:55:06.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:55:06.241 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:55:06.242 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:55:06.243 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:55:06.244 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:55:06.244 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:55:06.245 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:55:06.246 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:55:06.246 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:55:06.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:55:06.248 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:55:06.248 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:55:06.249 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:55:06.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:09:0b:70:2a:df:56:b3:7a:c4:1d:ca:41:d9:67:e1:d0:77:91:f3] modulus: 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 public exponent: 10001 ] 2022-05-09 13:56:05.344 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:56:05.346 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:56:05.347 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-09 13:56:05.347 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:56:05.348 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-09 13:56:05.348 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:56:05.348 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:56:05.348 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:56:05.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:56:05.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:56:05.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:56:05.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:56:05.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:56:05.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:56:05.493 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:56:05.494 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:56:05.494 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:56:05.494 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:56:05.496 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:56:05.496 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:56:05.497 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:56:05.497 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:56:05.497 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:56:05.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:56:05.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:56:05.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:56:05.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:56:05.499 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:56:05.499 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:56:05.499 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:56:05.501 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:10:80:a8:4b:66:4e:4e:a1:4c:b7:85:a2:62:28:15:e5:d8:0c:25] modulus: b2067973dbb77066a5007d889b16ce77ce384ee659d903d5f4e86736858a23ae37dd0d273050149f747382c9cbb2cefba228a56af21a9c55299b830f572b439a331454a123e7034a663832b40bc2aa905257e1210279cdd0bf5ae47daba48bad1809d1f58172f0a9f3517d0c28a6f8b4e30dfb093e64fdea55feffa2c67005694375fdb1f05ca8fa5b8df94e4329dd1d66978681a0b6ee0ac178ab75210126fd059a7533c0550cf135caeb2ca078221e901b72ab344f59c487177cede01ddce24edf94ee9b2814131aa9474536ad9bd642ca6b58cac36bab0aa2c350c9776a192d99c730b8e75b79747e0e84bccef7438a48d0b3b5528c419862d02f769bf48b public exponent: 10001 ] 2022-05-09 13:58:05.338 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:58:05.341 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:58:05.344 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-09 13:58:05.345 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:58:05.345 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-09 13:58:05.345 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:58:05.346 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:58:05.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:58:05.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:58:05.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:58:05.352 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:58:05.353 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:58:05.354 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:58:05.354 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:58:05.488 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:58:05.490 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:58:05.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:58:05.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:58:05.495 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:58:05.497 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:58:05.498 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:05.500 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:05.501 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:05.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:05.504 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:05.504 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:05.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:05.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:05.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:05.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:58:05.509 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:3c:14:ab:f6:55:b1:e5:85:86:c6:fa:2b:10:6e:f4:ea:ac:89:5b] modulus: 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 public exponent: 10001 ] 2022-05-09 13:58:37.542 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:58:37.543 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:58:37.545 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-09 13:58:37.546 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:58:37.547 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-09 13:58:37.548 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:58:37.548 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:58:37.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:58:37.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:58:37.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:58:37.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:58:37.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:58:37.553 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:58:37.553 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:58:37.680 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:58:37.681 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:58:37.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:58:37.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:58:37.684 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:58:37.684 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:58:37.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:37.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:37.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:37.686 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:37.686 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:37.687 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:37.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:37.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:37.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:37.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:58:37.692 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:83:04:02:f1:ac:87:a5:0b:4f:53:9b:46:ac:7d:b9:34:3d:18:60] modulus: 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 public exponent: 10001 ] 2022-05-09 13:58:52.484 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-09 13:58:52.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-09 13:58:52.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-09 13:58:52.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-09 13:58:52.487 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-09 13:58:52.487 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-09 13:58:52.487 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-09 13:58:52.488 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-09 13:58:52.488 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-09 13:58:52.488 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-09 13:58:52.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-09 13:58:52.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:58:52.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-09 13:58:52.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:58:52.614 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-09 13:58:52.614 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-09 13:58:52.615 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-09 13:58:52.615 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-09 13:58:52.617 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-09 13:58:52.617 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-09 13:58:52.617 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:52.617 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:52.617 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:52.618 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:52.618 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:52.618 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:52.619 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-09 13:58:52.619 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-09 13:58:52.619 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-09 13:58:52.620 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-09 13:58:52.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79904257956860246944267444323313560582712788019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 09 12:39:41 UTC 2022 Final Date: Sat May 08 12:39:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 911e36de091fd76e75e636ea980c00520a08d326 ee85ff07b2105ea4383871da593ecfd3c884ab55 63b333abd8a8fed8608b17dafa787cd8d75b5fbd 801d056038b1370796ec07d09892e87aed9940de bd5958e329a6b21105faca2f048a2119acaefdcf 2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0 a3fa72322ec7732c3b6258b413e3655271b1b5b0 fd967ea17dad6395eed1228945ea0d93a804b347 4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92 bf79bf240e816fd388a36f88092dd14d2a49c60c 74800ee1d261609de285b2d9ce7d48f7b62e93df 41ee91769557e5b669015d4c049125037cdd2b72 f44685a28b0f70fbd75b46cde20b321d59a2dbee 0e53c170033301f3dadfbc83c5bcc51f952e5d56 5270d97d4a76367759c3b00e2dc4635a2761fe6a 51bb51b065df8534bf8bc3d0497b8d133adfb937 963e724f99b65a5607149433e42c5023fe83feea 20e358bd4e689c860011ed9f1fde6c5b903092d0 ef25856de827e130dfa3e14bcbbcbc8ae3d685aa 20b73f10 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:aa:74:33:31:3c:b8:d6:a2:ad:45:cf:22:8d:ca:32:fd:53:0a:80] modulus: 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 public exponent: 10001 ]