By type
2022-10-09 04:55:18,223 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-09 04:55:20,025 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-09 04:55:21.236 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Oct 09, 2022 4:55:25 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 09, 2022 4:55:25 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 09, 2022 4:55:25 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 09, 2022 4:55:25 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-09 04:55:25.988 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-09 04:55:26.403 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-10-09 04:55:26.835 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-09 04:55:28.358 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-09 04:55:28.362 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-10-09 04:55:28.363 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-09 04:55:28.413 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-09 04:55:28.492 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-09 04:55:28.498 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-09 04:55:28.756 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-10-09 04:55:30.447 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 09, 2022 4:55:32 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-09 04:55:34.378 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 17.954 seconds (JVM running for 21.993) Oct 09, 2022 4:55:52 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-09 04:56:29.804 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 04:56:29.823 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 04:56:29.880 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-09 04:56:29.886 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 04:56:29.920 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-09 04:56:29.923 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 04:56:29.925 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 04:56:29.927 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 04:56:29.927 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 04:56:29.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 04:56:29.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 04:56:29.959 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 04:56:30.042 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 04:56:30.055 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 04:56:30.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 04:56:30.062 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 04:56:30.991 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 04:56:30.997 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 04:56:30.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 04:56:31.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 04:56:31.018 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 04:56:31.021 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 04:56:31.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 04:56:31.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 04:56:31.025 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 04:56:31.090 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 04:56:31.091 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 04:56:31.091 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 04:56:31.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 04:56:31.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 04:56:31.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 04:56:31.126 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 04:56:31.188 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:37:8e:67:48:6d:16:f8:77:91:19:ef:6a:6b:5a:17:61:d0:ab:d3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:05:38.382 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:05:38.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:05:38.399 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-09 06:05:38.400 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:05:38.401 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-09 06:05:38.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:05:38.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:05:38.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:05:38.405 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:05:38.406 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:05:38.414 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:05:38.416 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:05:38.417 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:05:38.417 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:05:38.632 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:05:38.633 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:05:38.633 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:05:38.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:05:38.638 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:05:38.639 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:05:38.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:05:38.640 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:05:38.640 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:05:38.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:05:38.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:05:38.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:05:38.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:05:38.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:05:38.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:05:38.645 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:05:38.651 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:be:8b:33:57:c9:04:71:87:ab:35:10:ce:c9:1f:87:a0:b0:fc:28],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:07:25.789 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:07:25.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:07:25.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-09 06:07:25.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:07:25.797 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-09 06:07:25.799 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:07:25.800 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:07:25.801 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:07:25.801 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:07:25.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:07:25.810 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:07:25.811 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:07:25.811 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:07:25.812 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:07:26.024 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:07:26.025 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:07:26.026 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:07:26.027 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:07:26.030 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:07:26.031 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:07:26.031 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:07:26.032 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:07:26.032 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:07:26.033 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:07:26.034 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:07:26.034 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:07:26.035 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:07:26.035 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:07:26.036 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:07:26.038 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:07:26.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: c2bdd561c763f32afb9f62cd62cd4663ba05d0c0c3d4a1bc71e336cbca1890ec0be88f109eaa161850df70eabe07446c9146ba46f71f960c230f39105c94592ebd0eed74fd4373a55162925626c9dd883095ad7588a028be41b9a60551602c234b414999d26ba071cdc8c683c5eb19464e46014f28ef380919a64371f6dbd0c2f95ee786be89cc2ea0d03adc0e4699871adfda3cc8a6829e74973543db40e09192410b0eeffeedc53f2e570789c2788cad541bc1d85d24ac369da74709241ac975ff360af4696f9c7b3efa2d9c5043921f39f38eb07ecb4e992fdc709c812b0cd98743473add1e7a511b31b51cea1a86a363f7eacc8bb5e75c5b8ea1e92dca900a15ae4b14e731e49ae89d0540804747550434f1c8507eaac69c0e5722f4a2f26839d0ece12ac839b47be0961c8392741fd072ef0f8319dc02accf782022f388020000052dd69ec269d632133e52e2ec012eae4e8dc57fef6e7c074b3d386ca842fef5603f5466b279906f9ce5363bd2bada5df1f63de995e768bd45ae64ee4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:e3:52:30:39:d6:2b:ca:33:2e:91:49:7c:09:a6:73:89:3d:9f:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:08:35.590 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:08:35.592 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:08:35.596 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-09 06:08:35.597 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:08:35.604 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-09 06:08:35.605 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:08:35.605 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:08:35.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:08:35.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:08:35.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:08:35.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:08:35.623 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:08:35.624 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:08:35.624 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:08:35.759 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:08:35.761 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:08:35.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:08:35.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:08:35.772 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:08:35.773 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:08:35.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:08:35.783 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:08:35.784 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:08:35.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:08:35.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:08:35.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:08:35.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:08:35.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:08:35.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:08:35.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:08:35.812 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:7f:a2:bc:60:1f:55:27:89:99:a3:ba:54:a4:51:9a:86:c3:fc:17],[56:66:d1:a4] modulus: e4e963daa8b36573323665025697b41f7cf863e27c5d839f8df35b9c2cb93b0c3cd5bbd9c48c9554cca145bf32c58790208e20965347f5f2e83c502e685a0dc4ced52f195b3f9417a470e6722774e7ad19e9c2e53566237db184a35b1018d666cb719461689d5deeb30bf4f13acac272075656e7c1f01a5f6acf94bc8bb2af7ea55bed9144b09bf1b7cafd4476e12f1002138f38f4ebcc4cfd8be158ac325b64fbdfa4b3d8ef3857f3b4396dad83c99a86d557b06717e0e6c7246ab27d5917e66c21dc8f592e80f8ccccd8aa11bcaa406c9baf082c822e282df11d0f79179aa06c713a34259814e483cad868dd5c1bdc741a45ed2ffee8c527b1ddb02d24bc33 public exponent: 10001 ] 2022-10-09 06:10:40.793 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:10:40.798 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:10:40.803 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-09 06:10:40.806 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:10:40.807 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-09 06:10:40.808 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:10:40.809 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:10:40.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:10:40.811 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:10:40.811 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:10:40.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:10:40.821 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:10:40.822 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:10:40.822 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:10:40.970 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:10:40.971 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:10:40.971 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:10:40.972 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:10:40.974 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:10:40.975 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:10:40.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:10:40.977 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:10:40.978 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:10:40.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:10:40.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:10:40.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:10:40.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:10:40.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:10:40.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:10:40.982 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:10:40.987 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:67:22:de:68:f0:d6:1d:41:c6:92:0a:50:ff:da:17:0b:ca:c9:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:17:18.190 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:17:18.193 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:17:18.195 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-09 06:17:18.196 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:17:18.202 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-09 06:17:18.205 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:17:18.205 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:17:18.206 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:17:18.206 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:17:18.210 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:17:18.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:17:18.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:17:18.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:17:18.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:17:18.439 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:17:18.441 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:17:18.442 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:17:18.442 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:17:18.450 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:17:18.454 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:17:18.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:17:18.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:17:18.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:17:18.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:17:18.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:17:18.474 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:17:18.475 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:17:18.475 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:17:18.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:17:18.483 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:17:18.491 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: c2bdd561c763f32afb9f62cd62cd4663ba05d0c0c3d4a1bc71e336cbca1890ec0be88f109eaa161850df70eabe07446c9146ba46f71f960c230f39105c94592ebd0eed74fd4373a55162925626c9dd883095ad7588a028be41b9a60551602c234b414999d26ba071cdc8c683c5eb19464e46014f28ef380919a64371f6dbd0c2f95ee786be89cc2ea0d03adc0e4699871adfda3cc8a6829e74973543db40e09192410b0eeffeedc53f2e570789c2788cad541bc1d85d24ac369da74709241ac975ff360af4696f9c7b3efa2d9c5043921f39f38eb07ecb4e992fdc709c812b0cd98743473add1e7a511b31b51cea1a86a363f7eacc8bb5e75c5b8ea1e92dca900a15ae4b14e731e49ae89d0540804747550434f1c8507eaac69c0e5722f4a2f26839d0ece12ac839b47be0961c8392741fd072ef0f8319dc02accf782022f388020000052dd69ec269d632133e52e2ec012eae4e8dc57fef6e7c074b3d386ca842fef5603f5466b279906f9ce5363bd2bada5df1f63de995e768bd45ae64ee4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:bc:d4:6b:60:82:53:62:b2:5f:12:25:9d:b8:c3:94:7d:8e:ca:a3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:23:20.868 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:23:20.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:23:20.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-09 06:23:20.876 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:23:20.877 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-09 06:23:20.878 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:23:20.879 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:23:20.879 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:23:20.879 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:23:20.880 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:23:20.884 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:23:20.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:23:20.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:23:20.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:23:21.085 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:23:21.086 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:23:21.087 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:23:21.087 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:23:21.089 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:23:21.090 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:23:21.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:23:21.091 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:23:21.091 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:23:21.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:23:21.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:23:21.094 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:23:21.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:23:21.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:23:21.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:23:21.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:23:21.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:c3:73:0f:bb:e8:00:71:d0:a9:6b:18:2b:7f:59:46:8b:b4:7e:c9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:23:37.620 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:23:37.622 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:23:37.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-09 06:23:37.624 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:23:37.624 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-09 06:23:37.625 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:23:37.626 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:23:37.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:23:37.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:23:37.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:23:37.633 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:23:37.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:23:37.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:23:37.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:23:37.779 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:23:37.780 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:23:37.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:23:37.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:23:37.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:23:37.783 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:23:37.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:23:37.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:23:37.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:23:37.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:23:37.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:23:37.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:23:37.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:23:37.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:23:37.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:23:37.801 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:23:37.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:d7:fc:70:32:15:96:e3:23:db:ea:27:56:65:18:92:dc:44:58:31],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:39:58.973 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:39:58.978 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:39:58.982 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-09 06:39:58.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:39:58.985 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-09 06:39:58.986 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:39:58.987 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:39:58.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:39:58.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:39:58.991 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:39:58.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:39:59.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:39:59.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:39:59.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:39:59.177 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:39:59.177 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:39:59.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:39:59.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:39:59.180 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:39:59.180 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:39:59.181 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:39:59.181 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:39:59.181 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:39:59.182 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:39:59.183 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:39:59.183 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:39:59.184 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:39:59.184 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:39:59.185 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:39:59.186 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:39:59.189 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: c2bdd561c763f32afb9f62cd62cd4663ba05d0c0c3d4a1bc71e336cbca1890ec0be88f109eaa161850df70eabe07446c9146ba46f71f960c230f39105c94592ebd0eed74fd4373a55162925626c9dd883095ad7588a028be41b9a60551602c234b414999d26ba071cdc8c683c5eb19464e46014f28ef380919a64371f6dbd0c2f95ee786be89cc2ea0d03adc0e4699871adfda3cc8a6829e74973543db40e09192410b0eeffeedc53f2e570789c2788cad541bc1d85d24ac369da74709241ac975ff360af4696f9c7b3efa2d9c5043921f39f38eb07ecb4e992fdc709c812b0cd98743473add1e7a511b31b51cea1a86a363f7eacc8bb5e75c5b8ea1e92dca900a15ae4b14e731e49ae89d0540804747550434f1c8507eaac69c0e5722f4a2f26839d0ece12ac839b47be0961c8392741fd072ef0f8319dc02accf782022f388020000052dd69ec269d632133e52e2ec012eae4e8dc57fef6e7c074b3d386ca842fef5603f5466b279906f9ce5363bd2bada5df1f63de995e768bd45ae64ee4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:eb:b9:df:d0:f0:db:dd:ac:5b:d5:0a:75:c7:26:e6:53:ee:8e:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-09 06:40:19.955 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-09 06:40:19.959 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-09 06:40:19.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-09 06:40:19.963 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-09 06:40:19.964 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-09 06:40:19.964 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-09 06:40:19.965 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-09 06:40:19.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-09 06:40:19.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-09 06:40:19.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-09 06:40:19.991 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-09 06:40:19.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:40:19.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-09 06:40:19.994 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:40:20.122 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-09 06:40:20.124 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-09 06:40:20.124 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-09 06:40:20.128 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-09 06:40:20.130 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-09 06:40:20.130 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-09 06:40:20.130 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:40:20.131 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:40:20.131 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:40:20.132 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:40:20.133 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:40:20.134 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:40:20.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-09 06:40:20.136 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-09 06:40:20.137 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-09 06:40:20.139 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-09 06:40:20.144 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193742334134093726406057264095404038157699776498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 09 04:46:50 UTC 2022 Final Date: Fri Oct 08 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0e:5e:f3:4c:2c:df:c3:54:ea:16:2d:2f:11:6d:6c:9d:86:16:c6:a0],[56:66:d1:a4] modulus: c2bdd561c763f32afb9f62cd62cd4663ba05d0c0c3d4a1bc71e336cbca1890ec0be88f109eaa161850df70eabe07446c9146ba46f71f960c230f39105c94592ebd0eed74fd4373a55162925626c9dd883095ad7588a028be41b9a60551602c234b414999d26ba071cdc8c683c5eb19464e46014f28ef380919a64371f6dbd0c2f95ee786be89cc2ea0d03adc0e4699871adfda3cc8a6829e74973543db40e09192410b0eeffeedc53f2e570789c2788cad541bc1d85d24ac369da74709241ac975ff360af4696f9c7b3efa2d9c5043921f39f38eb07ecb4e992fdc709c812b0cd98743473add1e7a511b31b51cea1a86a363f7eacc8bb5e75c5b8ea1e92dca900a15ae4b14e731e49ae89d0540804747550434f1c8507eaac69c0e5722f4a2f26839d0ece12ac839b47be0961c8392741fd072ef0f8319dc02accf782022f388020000052dd69ec269d632133e52e2ec012eae4e8dc57fef6e7c074b3d386ca842fef5603f5466b279906f9ce5363bd2bada5df1f63de995e768bd45ae64ee4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4a1d6abea034d23c7add07bdcc9fea9dc6950643 de03c79ec9b28cf7a0ae930e0acac4500fca9bce dbdbae797044999509cc26f0946b53ed6a861d5b 668673fe09e31678cd7dbab4120c5c973b841255 9d2adaf46ea40a0de4d8e0ccf2de6079def60c61 018409a8ebfb180389ad49e442a285beb8c2c757 6914a26ba02a14fa40212bf7ae0dc1d5fb4458ad 23d3a602f381a560cf752eca5223a0eee133d0c8 0fad5d8b73ff01d0cd38b9321c2d8c9587c2c174 1e888fa90b7cee0f2e706fa62ee2ae0330d5372a 86e83de2b922e6dcd1cc89f2c9644cadd9609020 ca12d4b27340f9b2c8d156410662e8234dca106e 407f8f3448f6af07349fb63a06d22de407c3953a 1d4fb99585e4590ecff4f36e25b3dbf376e8f5d3 b82f4b4d81d56c28111a50ef25055274524a1a29 77c2576bfed96eec7d0bbe9509455fad1772f294 91f86c87347688ba837fa560537074c478290a02 494002fd5910da64b37495f43586463bb3c8c25f df1fadcad144d332bb0317a71e57e3709f31df71 4f0e5d9b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:ac:64:14:91:42:2e:99:82:1f:8f:c2:1c:3c:28:cc:bd:08:87:bb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]