By type
2022-06-24 05:15:34,786 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-24 05:15:35,713 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-24 05:15:36.440 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 24, 2022 5:15:38 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 24, 2022 5:15:38 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 24, 2022 5:15:38 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 24, 2022 5:15:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-24 05:15:38.946 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-24 05:15:39.233 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-24 05:15:39.395 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-24 05:15:40.141 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-24 05:15:40.144 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-24 05:15:40.146 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-24 05:15:40.150 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-24 05:15:40.189 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-24 05:15:40.192 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-24 05:15:40.315 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-24 05:15:40.845 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 24, 2022 5:15:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-24 05:15:41.804 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.827 seconds (JVM running for 9.584) Jun 24, 2022 5:16:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-24 05:16:27.145 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 05:16:27.154 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 05:16:27.189 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-24 05:16:27.193 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 05:16:27.212 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-24 05:16:27.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 05:16:27.215 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 05:16:27.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 05:16:27.217 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 05:16:27.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 05:16:27.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 05:16:27.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 05:16:27.272 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 05:16:27.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 05:16:27.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 05:16:27.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 05:16:28.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 05:16:28.066 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 05:16:28.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 05:16:28.068 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 05:16:28.077 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 05:16:28.078 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 05:16:28.079 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 05:16:28.079 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 05:16:28.080 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 05:16:28.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 05:16:28.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 05:16:28.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 05:16:28.100 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 05:16:28.100 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 05:16:28.101 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 05:16:28.102 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 05:16:28.132 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:f2:01:5b:3a:c5:82:0e:f7:d9:ea:9f:46:ec:bc:36:ec:ed:dd:f8] modulus: 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 public exponent: 10001 ] 2022-06-24 07:30:47.666 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:30:47.670 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:30:47.673 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-24 07:30:47.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:30:47.675 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-24 07:30:47.677 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:30:47.677 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:30:47.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:30:47.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:30:47.679 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:30:47.688 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:30:47.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:30:47.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:30:47.690 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:30:48.098 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:30:48.099 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:30:48.100 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:30:48.100 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:30:48.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:30:48.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:30:48.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:30:48.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:30:48.105 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:30:48.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:30:48.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:30:48.107 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:30:48.107 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:30:48.108 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:30:48.108 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:30:48.110 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:30:48.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:47:20:e6:c3:58:f2:86:ba:6b:77:b0:a7:ea:62:ed:d6:d7:5c:f6] modulus: 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 public exponent: 10001 ] 2022-06-24 07:32:35.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:32:35.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:32:35.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-24 07:32:35.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:32:35.903 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-24 07:32:35.904 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:32:35.904 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:32:35.905 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:32:35.905 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:32:35.906 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:32:35.913 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:32:35.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:32:35.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:32:35.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:32:36.144 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:32:36.144 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:32:36.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:32:36.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:32:36.148 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:32:36.148 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:32:36.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:32:36.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:32:36.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:32:36.150 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:32:36.150 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:32:36.151 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:32:36.151 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:32:36.152 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:32:36.152 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:32:36.153 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:32:36.156 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:8e:de:d9:62:15:b3:77:1c:08:1d:a6:b4:a2:c9:81:ab:24:46:b0] modulus: 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 public exponent: 10001 ] 2022-06-24 07:33:44.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:33:44.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:33:44.923 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-24 07:33:44.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:33:44.925 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-24 07:33:44.926 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:33:44.927 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:33:44.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:33:44.928 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:33:44.929 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:33:44.934 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:33:44.935 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:33:44.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:33:44.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:33:45.221 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:33:45.222 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:33:45.222 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:33:45.222 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:33:45.244 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:33:45.245 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:33:45.245 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:33:45.246 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:33:45.246 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:33:45.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:33:45.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:33:45.248 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:33:45.248 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:33:45.249 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:33:45.249 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:33:45.250 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:33:45.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:b5:4f:bf:c3:57:f5:f4:4b:56:84:77:41:28:11:90:2a:e1:09:b5] modulus: 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 public exponent: 10001 ] 2022-06-24 07:36:04.375 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:36:04.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:36:04.380 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-24 07:36:04.381 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:36:04.382 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-24 07:36:04.383 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:36:04.384 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:36:04.385 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:36:04.385 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:36:04.386 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:36:04.395 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:36:04.396 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:36:04.396 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:36:04.397 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:36:04.685 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:36:04.686 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:36:04.687 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:36:04.687 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:36:04.689 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:36:04.690 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:36:04.690 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:36:04.690 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:36:04.691 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:36:04.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:36:04.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:36:04.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:36:04.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:36:04.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:36:04.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:36:04.695 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:36:04.699 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: b297359d3783369d6d31a9595dfc2f295d1681c7fc70de95138947dc6790014eb2f0d8afbc012d65e482dddac35cd6089fff5890e8051118c17f20d4ce8779033df30c3511d3cf67777a12697b0a1b051e13946660872358e152bd4356cc9d10be266821d351a8d7d203f2f16b5aa9e1d182282df5caa943b464f783af3a83fbd9b2b7230611fa156914101b9a7d496cf831b304aa34eb7af41b0642a4826ed116723627644440f97410447be9a2076f4cc7dc87afc44c5e159f8e6e022d12a07144d7d3d026bc04b15afc59f959d2577f223a369971f9c568c878c07a65506611477a21f8110fbaf461b994ebb674682ed70c76986a301ccdc8cefa0f21478e396ef7613d389d216ec39bd5b0b2ca1cd6f17a5d4e1fe3eba6fdf12f71b00a4722e3adc881fa2d8ffeb4d85317ffca0fc87064120efd5f74cdfcc070f0ebbdc2e1b0d5b3106002dc717e3e9c50bf9cdaa0f5cf76d180bcb37340d2e13a68443255f79dbe3fc7a38816e31ec011556bd61acd7b7f93b2586dcaea79d1e4c3d0c3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:84:f0:0e:c1:67:7e:60:fe:37:db:e3:9b:07:a0:9e:31:b4:3e:59] modulus: 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 public exponent: 10001 ] 2022-06-24 07:51:53.786 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:51:53.789 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:51:53.791 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-24 07:51:53.792 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:51:53.793 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-24 07:51:53.793 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:51:53.794 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:51:53.794 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:51:53.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:51:53.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:51:53.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:51:53.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:51:53.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:51:53.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:51:54.131 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:51:54.132 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:51:54.132 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:51:54.132 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:51:54.134 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:51:54.134 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:51:54.134 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:51:54.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:51:54.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:51:54.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:51:54.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:51:54.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:51:54.137 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:51:54.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:51:54.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:51:54.139 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:51:54.143 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:13:90:51:b7:7d:69:e2:8d:f3:3b:01:17:58:2e:9c:d2:93:68:47] modulus: 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 public exponent: 10001 ] 2022-06-24 07:57:17.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:57:17.784 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:57:17.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-24 07:57:17.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:57:17.789 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-24 07:57:17.790 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:57:17.791 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:57:17.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:57:17.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:57:17.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:57:17.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:57:17.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:57:17.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:57:17.800 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:57:18.254 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:57:18.254 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:57:18.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:57:18.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:57:18.256 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:57:18.257 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:57:18.257 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:57:18.257 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:57:18.258 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:57:18.259 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:57:18.259 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:57:18.260 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:57:18.261 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:57:18.261 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:57:18.262 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:57:18.263 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:57:18.267 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: b297359d3783369d6d31a9595dfc2f295d1681c7fc70de95138947dc6790014eb2f0d8afbc012d65e482dddac35cd6089fff5890e8051118c17f20d4ce8779033df30c3511d3cf67777a12697b0a1b051e13946660872358e152bd4356cc9d10be266821d351a8d7d203f2f16b5aa9e1d182282df5caa943b464f783af3a83fbd9b2b7230611fa156914101b9a7d496cf831b304aa34eb7af41b0642a4826ed116723627644440f97410447be9a2076f4cc7dc87afc44c5e159f8e6e022d12a07144d7d3d026bc04b15afc59f959d2577f223a369971f9c568c878c07a65506611477a21f8110fbaf461b994ebb674682ed70c76986a301ccdc8cefa0f21478e396ef7613d389d216ec39bd5b0b2ca1cd6f17a5d4e1fe3eba6fdf12f71b00a4722e3adc881fa2d8ffeb4d85317ffca0fc87064120efd5f74cdfcc070f0ebbdc2e1b0d5b3106002dc717e3e9c50bf9cdaa0f5cf76d180bcb37340d2e13a68443255f79dbe3fc7a38816e31ec011556bd61acd7b7f93b2586dcaea79d1e4c3d0c3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:ff:50:4c:9a:a7:14:1b:2a:6f:d5:89:14:d5:29:f6:e2:b3:ac:58] modulus: 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 public exponent: 10001 ] 2022-06-24 07:57:32.897 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-24 07:57:32.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-24 07:57:32.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-24 07:57:32.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-24 07:57:32.900 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-24 07:57:32.900 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-24 07:57:32.901 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-24 07:57:32.901 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-24 07:57:32.901 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-24 07:57:32.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-24 07:57:32.906 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-24 07:57:32.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:57:32.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-24 07:57:32.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:57:33.178 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-24 07:57:33.179 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-24 07:57:33.179 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-24 07:57:33.179 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-24 07:57:33.181 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-24 07:57:33.181 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-24 07:57:33.182 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:57:33.182 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:57:33.182 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:57:33.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:57:33.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:57:33.184 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:57:33.184 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-24 07:57:33.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-24 07:57:33.185 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-24 07:57:33.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-24 07:57:33.189 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 223904999455805704837666803545061931672344918992 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 24 05:12:21 UTC 2022 Final Date: Wed Jun 23 05:12:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351 990b537fb556c17d4f407566d1e8666d4323e994 05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa c89f54c5d37a6c5e3962e74ab94552818b7f2ce2 193d4a38c94b193c42ad6fc824199c8adc965a64 6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821 d9df9939c5a66b0ca44d09516bbf34329a34ffab 79ec5921b4ed19d683d0d75f45b306e35dd10e4c aafce397c58e4457b4c1bfbad9417121d915922f c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10 63f0e796617ae49dcfbb21e33d1772b4b3a12e7e b241379c05682009bed6ad07f6033a819f041e71 0f8d96f3344a545a59a7048751021bfd6a6be97b b7dcc1921ec4370aaf7274e73d70218bcc1f845e f1ae0c1098172dc21d274d588f7fd1a88a5cef4a 6760c2b86f154c9b2171350e836d9fb17fc8da97 c2b9a09765a3085648c801d8074088893cc78f20 ec72762a291b8644b02c59f7590e945fde176087 7912a2158b25758ce369a341890e085bdb28a0e6 60cadb66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:ad:bf:38:f7:42:da:5d:3e:c2:c1:2b:14:9a:0e:f5:47:c6:2e:80] modulus: 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 public exponent: 10001 ]