By type
2022-06-07 07:12:20,485 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-07 07:12:21,560 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-07 07:12:22.334 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 07, 2022 7:12:24 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 07, 2022 7:12:24 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 07, 2022 7:12:24 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 07, 2022 7:12:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-07 07:12:25.049 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-07 07:12:25.393 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-07 07:12:25.559 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-07 07:12:26.255 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-07 07:12:26.258 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-07 07:12:26.260 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-07 07:12:26.264 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-07 07:12:26.314 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-07 07:12:26.317 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-07 07:12:26.438 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-07 07:12:27.013 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 07, 2022 7:12:27 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-07 07:12:28.705 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.102 seconds (JVM running for 10.958) Jun 07, 2022 7:12:55 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-07 07:13:05.114 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 07:13:05.122 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 07:13:05.168 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 07:13:05.174 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 07:13:05.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 07:13:05.205 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 07:13:05.206 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 07:13:05.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 07:13:05.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 07:13:05.217 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 07:13:05.226 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 07:13:05.230 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 07:13:05.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 07:13:05.277 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 07:13:05.278 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 07:13:05.282 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 07:13:05.902 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 07:13:05.905 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 07:13:05.905 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 07:13:05.908 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 07:13:05.921 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 07:13:05.923 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 07:13:05.925 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 07:13:05.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 07:13:05.927 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 07:13:05.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 07:13:05.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 07:13:05.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 07:13:05.953 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 07:13:05.953 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 07:13:05.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 07:13:05.957 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 07:13:05.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:ed:90:80:17:36:19:4e:23:ec:db:c6:22:5c:f2:b2:cb:31:91:b5] modulus: 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 public exponent: 10001 ] 2022-06-07 08:33:51.177 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:33:51.183 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:33:51.191 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 08:33:51.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:33:51.194 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 08:33:51.195 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:33:51.195 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:33:51.196 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:33:51.197 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:33:51.198 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:33:51.240 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:33:51.241 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:33:51.242 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:33:51.242 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:33:51.446 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:33:51.447 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:33:51.447 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:33:51.448 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:33:51.451 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:33:51.452 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:33:51.452 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:33:51.452 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:33:51.453 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:33:51.454 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:33:51.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:33:51.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:33:51.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:33:51.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:33:51.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:33:51.458 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:33:51.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:27:22:a6:70:5a:f4:0a:ea:50:1d:ac:80:91:0f:a3:c9:c8:1d:7d] modulus: d8073df21fc90c4f7aadf84f546bafa4b5813fe89f45140d790df78c36ea1bd246c001863b661c4c9f2e09fd976047ca8a73126d593c27c56566569b10d6d699162d52231a3e6b826a2d4f141557da1bd8b6a16e1e1edb0519941edd6fa85981498a766ed6c3fd770559d7905e353e943a4bb80ae545c9c003c7ae6c023ee571d99cb6eb6be81166f4f7a0c8e3e508769eb061350a932188225f33b0ff153bad7d7a334b9e8a43ff2ab2cbda0dc4dd5dc2521ba44dbc9e93a3ea20ca5b4eb91c25f14db6750d14c34239b8bb401373e0f8e062acb8293c6ea4e33935e36fe609b6d1f24c3d142a6332ee5b8b573ef2bc30d4189b3c6ab0ba6e5af71c67836489 public exponent: 10001 ] 2022-06-07 08:35:40.048 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:35:40.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:35:40.051 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 08:35:40.051 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:35:40.052 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 08:35:40.053 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:35:40.053 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:35:40.054 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:35:40.054 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:35:40.055 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:35:40.066 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:35:40.067 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:35:40.067 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:35:40.067 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:35:40.206 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:35:40.207 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:35:40.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:35:40.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:35:40.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:35:40.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:35:40.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:35:40.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:35:40.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:35:40.213 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:35:40.214 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:35:40.214 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:35:40.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:35:40.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:35:40.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:35:40.229 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:35:40.234 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:80:e8:76:2d:c0:a9:b8:0d:d5:7e:b4:8d:31:05:73:69:c8:63:7e] modulus: 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 public exponent: 10001 ] 2022-06-07 08:36:41.676 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:36:41.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:36:41.680 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 08:36:41.681 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:36:41.684 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 08:36:41.685 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:36:41.686 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:36:41.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:36:41.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:36:41.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:36:41.694 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:36:41.694 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:36:41.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:36:41.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:36:41.927 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:36:41.928 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:36:41.929 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:36:41.929 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:36:41.931 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:36:41.932 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:36:41.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:36:41.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:36:41.934 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:36:41.934 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:36:41.935 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:36:41.935 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:36:41.936 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:36:41.936 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:36:41.937 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:36:41.938 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:36:41.943 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:e2:9f:20:e2:d7:e0:12:de:53:04:21:86:1c:80:ff:6c:d8:99:39] modulus: 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 public exponent: 10001 ] 2022-06-07 08:39:07.448 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:39:07.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:39:07.451 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 08:39:07.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:39:07.453 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 08:39:07.454 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:39:07.454 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:39:07.458 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:39:07.459 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:39:07.459 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:39:07.465 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:39:07.466 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:39:07.467 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:39:07.467 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:39:07.616 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:39:07.617 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:39:07.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:39:07.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:39:07.620 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:39:07.620 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:39:07.621 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:39:07.621 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:39:07.621 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:39:07.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:39:07.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:39:07.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:39:07.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:39:07.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:39:07.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:39:07.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:39:07.629 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:3b:b0:4e:f0:e6:71:00:b2:28:29:61:21:c2:92:e5:92:5f:7f:31] modulus: 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 public exponent: 10001 ] 2022-06-07 08:48:16.782 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:48:16.784 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:48:16.787 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 08:48:16.788 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:48:16.788 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 08:48:16.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:48:16.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:48:16.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:48:16.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:48:16.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:48:16.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:48:16.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:48:16.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:48:16.799 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:48:16.987 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:48:16.988 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:48:16.989 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:48:16.989 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:48:16.991 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:48:16.995 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:48:16.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:48:16.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:48:16.996 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:48:16.997 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:48:16.998 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:48:16.998 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:48:16.999 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:48:16.999 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:48:17.000 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:48:17.001 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:48:17.006 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:7a:25:d2:64:5b:1f:b2:c7:89:89:63:9c:bc:4f:90:f1:de:26:20] modulus: e99f1ecae9a34de3950e2346fb4e08771d605f775569dfbea751c73a9d4a4455bdb1f20a4f5028422a3daa140968da5d9654ca1c78b4f4ce8727535929f15aa2d7397e97a1c89559ec3499266a07d0c412b92277dd5c985bd119e1004a7290727216d917b3d1c18cd6e83450c3319533ee8760bb1a4690237b3fc8dee02e855f9bd183d1fedc1f4bccd3b8b50ee56b866b64a595321cc619764f681303013971ca78e1abfaa334fde422e590b14c587eebd8fb831dc6f93a8a5b8300548b509c7b2c0b360a1bc5e8414707777e7a587b7185d1ebbdabf297cc6a42cec4570b8924f530d231cca9a22514ece0a7654b01851398c5be01fc1da22f5f629dd1d0bb public exponent: 10001 ] 2022-06-07 08:53:45.570 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:53:45.573 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:53:45.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 08:53:45.577 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:53:45.577 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 08:53:45.578 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:53:45.578 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:53:45.579 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:53:45.579 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:53:45.580 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:53:45.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:53:45.586 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:53:45.586 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:53:45.587 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:53:45.773 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:53:45.773 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:53:45.774 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:53:45.774 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:53:45.776 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:53:45.776 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:53:45.777 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:53:45.777 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:53:45.778 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:53:45.778 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:53:45.779 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:53:45.779 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:53:45.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:53:45.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:53:45.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:53:45.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:53:45.786 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:ca:e1:29:67:7d:4b:31:a5:1f:85:d4:b5:a6:e4:db:e7:78:91:01] modulus: b1149ae2e37559def5ce15e6de72c99d170896e1b50065f449a06bb2b8f36b7558c5123150885db1791a54f8836e602e5e8146baa4523983f9553340d7644d5dde2ff08ed2419f3b9bdc2dbaef6adf7c00ffbc9ba565e913013348462ddfc6a7e0c51483da4280582fd156eb3768b1e130c636dc049108e5710772d42d3d9364b2b6863cc660b5a14a6cc552904d859496e11ef0b3308abd211bd45ed1ef86ddf7d086f1d4092cf6e1321d7e5785eccd81231d104f2ec95e5049ae6b5469980ab78c70aeb6af658d0c7ae369898151dccd62ff2948c189d6164c97d0ceb925fd63e54814fa7c92bac4ca23150f503ed2e0127ceba001788046a901c72c30af4d public exponent: 10001 ] 2022-06-07 08:54:02.817 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 08:54:02.818 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 08:54:02.820 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 08:54:02.821 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 08:54:02.821 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 08:54:02.822 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 08:54:02.822 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 08:54:02.823 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 08:54:02.823 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 08:54:02.824 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 08:54:02.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 08:54:02.831 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:54:02.831 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 08:54:02.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:54:02.993 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 08:54:02.994 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 08:54:02.994 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 08:54:02.995 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 08:54:02.996 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 08:54:02.996 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 08:54:02.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:54:02.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:54:02.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:54:02.998 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:54:02.998 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:54:02.998 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:54:03.000 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 08:54:03.000 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 08:54:03.001 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 08:54:03.003 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 08:54:03.010 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 115216009871510384736138162763750823792640401629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 07:10:03 UTC 2022 Final Date: Sun Jun 06 07:10:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:c7:99:24:40:10:a7:68:7c:c4:0c:7a:ee:99:c5:d3:5a:e3:1d:f5] modulus: 9b37779607e383ff3a14a869e00f45359d5b565d9190a9b5701056945084022d45a405c4dc6b3570ebff648e4d8f0e094a843b2892e36b18dca921dbb1056b18df772fcafa3d6f1678e9ab283035b91cb44dd09d8f50b3351e6250f93b39c221beba11c8d08a6887acc501a773993cbec9c78a942d0bcc2fbec8135371ec0c4108335bd171d85ff3d46fb20b417a08cb2d69081108a1555b3b582d19bf03e641d0590fd445966f9f067ac0a805c703d0a19489ee75532b8027fe91650693aedea65df5198f75aac5c5469c3ebb7f97d4e01afaf184e26a9cebab1bdeaf62671dc4cd0629bb6bc925cd71ce3bdc116b284c276073c4030ca541b90f8ccd4ee1cf6ec1d085510cfd648b8f22356788d736e16a86f8b1bf5258fcb57d4de42f99a6bb3c5b4166f6c5db7d3a242a24da7f062a732fa6ea6676565ea379c0c178d14a1bb945c22cb948609c6368f9f4b429c70f5c2b45962eee6a8ede364d3950959399b056727f97507bcd1912fff3c414a6d6ea938a192884ccf6ae7de84bff478f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 37f78db1f7b7f329cbea7e10fd6a5273c92193a8 fc7eaf286407d2526440030162b6bc7dc0999679 a93348d12ab8a7129fa3cbc1cd15999c26303480 ae371a4b9c1d498917690a20383ef74543049b84 b363e731ffd10bef2aa9741764312b91195b0ea2 279f0cc3fc7d1e282ca0409c298fa5fa363b63be c1eed612ab09dab9331c879f802a053b2e90fabd 6d34461db71d428324f32893fb1c6dcb20dba230 ca7d0493a1938e386f1cac6ee79e636e742d2035 56b70855046f111b5d997ec28e2cae25f4fae143 a9182158e92e24983bae163d7fc2e44830014ba4 f9076a4bc3b2d51c4b52bfa9d5916984610d6aed 67594b56e626454a93bb568572035c460798d5fa 9e36bf7d8b20d593fd427c5610db6ba365d9a679 df296c4357edcd677efec3667aa6e7b31957d836 af8c41041496989c8c1ffe7b4e4bc520eaf07f20 35e9a7d1f98e8ce47115758bb1f0a641fcc8c59c 2291c26244c6ac565a065189340922aa0244d71d 7fd5660158ce55c6a6f2fffd7bf41710ab45c551 893b91c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:f8:ea:e0:e8:11:7b:bd:7c:4c:df:2b:c7:a2:03:41:a7:99:c5:ee] modulus: e7bef1ec8a66f4b6c37ccadbefe4ff923e4d616314444cb75fddbc6d7d07031c2f65bdf1d0b884def8fd67a948d463de90a96bf2c55917440a38d5b3ed7b120257cd44983cfcf17fb428dd12e31ab15342949be2cbbb6014f28f802b752ff6ab7ddfd1a787eb57ad9cc071df64354ff621f4654c42466a89470b95dae412d535ebff8b7d0120a9836736213d144ac8b8a559b5ee178b8d24e4efb215163e68e29a8127527c7b2d98af8598625e0fb0f591c6e97c420b73471b186f888fac3f3c7446f7dcddd65e1bcb87ffaeaa255900b322809bc51fe327b2a7b59ebc2016366d3dad67ee4769ea334302d4d326370cefcde60de42491bde7a94b1687c01019 public exponent: 10001 ]