By type
2022-10-10 04:52:07,060 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-10 04:52:07,786 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-10 04:52:08.341 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Oct 10, 2022 4:52:09 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 10, 2022 4:52:09 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 10, 2022 4:52:09 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 10, 2022 4:52:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-10 04:52:10.206 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-10 04:52:10.378 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-10-10 04:52:10.486 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-10 04:52:11.005 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-10 04:52:11.007 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-10-10 04:52:11.008 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-10 04:52:11.010 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-10 04:52:11.038 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-10 04:52:11.041 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-10-10 04:52:11.119 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-10-10 04:52:11.667 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 10, 2022 4:52:12 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-10 04:52:12.456 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.055 seconds (JVM running for 7.196) Oct 10, 2022 4:52:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-10 04:52:52.637 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 04:52:52.643 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 04:52:52.668 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-10 04:52:52.670 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 04:52:52.682 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-10 04:52:52.684 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 04:52:52.685 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 04:52:52.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 04:52:52.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 04:52:52.688 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 04:52:52.694 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 04:52:52.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 04:52:52.730 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 04:52:52.735 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 04:52:52.736 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 04:52:52.738 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 04:52:53.130 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 04:52:53.132 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 04:52:53.132 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 04:52:53.133 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 04:52:53.139 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 04:52:53.140 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 04:52:53.140 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 04:52:53.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 04:52:53.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 04:52:53.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 04:52:53.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 04:52:53.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 04:52:53.157 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 04:52:53.158 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 04:52:53.158 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 04:52:53.159 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 04:52:53.182 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:14:12:a0:33:0f:ae:da:b4:b1:f5:e7:5c:d2:31:48:da:ba:9c:00],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:04:30.424 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:04:30.427 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:04:30.430 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-10 06:04:30.432 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:04:30.432 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-10 06:04:30.433 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:04:30.433 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:04:30.433 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:04:30.434 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:04:30.434 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:04:30.438 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:04:30.438 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:04:30.439 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:04:30.439 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:04:30.629 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:04:30.631 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:04:30.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:04:30.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:04:30.633 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:04:30.633 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:04:30.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:04:30.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:04:30.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:04:30.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:04:30.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:04:30.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:04:30.636 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:04:30.636 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:04:30.636 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:04:30.637 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:04:30.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:69:ae:d7:a6:31:ef:7c:53:3f:31:3b:77:ad:57:fc:b8:34:a4:f1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:06:02.106 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:06:02.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:06:02.111 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-10 06:06:02.112 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:06:02.113 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-10 06:06:02.115 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:06:02.115 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:06:02.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:06:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:06:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:06:02.123 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:06:02.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:06:02.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:06:02.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:06:02.317 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:06:02.318 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:06:02.318 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:06:02.318 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:06:02.321 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:06:02.321 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:06:02.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:06:02.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:06:02.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:06:02.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:06:02.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:06:02.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:06:02.324 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:06:02.324 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:06:02.325 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:06:02.326 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:06:02.331 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:8b:95:8e:40:3a:e0:45:8e:b6:c4:aa:72:37:af:cb:db:11:fa:7c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:07:02.134 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:07:02.135 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:07:02.136 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-10 06:07:02.136 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:07:02.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-10 06:07:02.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:07:02.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:07:02.137 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:07:02.137 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:07:02.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:07:02.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:07:02.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:07:02.141 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:07:02.141 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:07:02.255 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:07:02.256 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:07:02.256 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:07:02.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:07:02.258 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:07:02.258 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:07:02.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:07:02.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:07:02.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:07:02.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:07:02.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:07:02.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:07:02.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:07:02.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:07:02.261 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:07:02.261 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:07:02.264 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: c2d32742277cdc42e0602a1171ef568881fd43d95820642fd9e0e2157f742c54ad4a628192af2a24a096bfc7a4d0c9a1c251cefc03e9bdb2d87d514afe6d7e90e4a5a90d27575af159f8057f3781924ca3f17c51038e82f6e0f4783b33f5af055857db05e00d1cd8e3bd048998a05a234919403385e5f6ca1e64fdf448f8f2f3df1849fa5c56d1ad807e06d2be3d46e18f4cbb6378d81a75a4c7a1897648d792019bcbeac19896386d509a3472ab534dbfc16c328fdfeb92c0979f0fd9e6b21d9917bd6193ad2c9bfb228f77b087cd6b307fcb8851c1a65d6b0bcce2da06c179d2b5928f039a22daf4afbe3071a528673265086e8ce14005fa56e64aac3fa72bc524142ff6d0edd17f2aecfc08d51b955448e10a784993e3ee52501353d661c9808219e79b7a750beba8236bfe9b81065cf296ee88eed8775417e91b573fc84e599f8220501ce7b7c5641d1e6e836a9b9999b2de220c4b54396163717d9e6ffb22424f963efbbc073cbcd666e16188398dca04ca80cddc9446a8b69d3c4e183b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:d1:c9:49:bf:d9:22:66:f9:87:01:7b:3d:33:f6:c2:fa:57:66:5f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:09:07.703 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:09:07.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:09:07.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-10 06:09:07.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:09:07.706 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-10 06:09:07.706 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:09:07.706 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:09:07.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:09:07.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:09:07.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:09:07.709 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:09:07.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:09:07.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:09:07.711 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:09:07.833 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:09:07.833 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:09:07.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:09:07.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:09:07.834 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:09:07.835 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:09:07.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:09:07.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:09:07.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:09:07.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:09:07.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:09:07.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:09:07.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:09:07.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:09:07.837 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:09:07.837 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:09:07.839 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: c2d32742277cdc42e0602a1171ef568881fd43d95820642fd9e0e2157f742c54ad4a628192af2a24a096bfc7a4d0c9a1c251cefc03e9bdb2d87d514afe6d7e90e4a5a90d27575af159f8057f3781924ca3f17c51038e82f6e0f4783b33f5af055857db05e00d1cd8e3bd048998a05a234919403385e5f6ca1e64fdf448f8f2f3df1849fa5c56d1ad807e06d2be3d46e18f4cbb6378d81a75a4c7a1897648d792019bcbeac19896386d509a3472ab534dbfc16c328fdfeb92c0979f0fd9e6b21d9917bd6193ad2c9bfb228f77b087cd6b307fcb8851c1a65d6b0bcce2da06c179d2b5928f039a22daf4afbe3071a528673265086e8ce14005fa56e64aac3fa72bc524142ff6d0edd17f2aecfc08d51b955448e10a784993e3ee52501353d661c9808219e79b7a750beba8236bfe9b81065cf296ee88eed8775417e91b573fc84e599f8220501ce7b7c5641d1e6e836a9b9999b2de220c4b54396163717d9e6ffb22424f963efbbc073cbcd666e16188398dca04ca80cddc9446a8b69d3c4e183b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:d4:f4:d7:0b:ea:dd:68:1c:0f:85:85:06:3d:e9:08:bf:ee:f4:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:18:52.197 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:18:52.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:18:52.201 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-10 06:18:52.202 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:18:52.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-10 06:18:52.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:18:52.203 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:18:52.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:18:52.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:18:52.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:18:52.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:18:52.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:18:52.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:18:52.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:18:52.367 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:18:52.368 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:18:52.369 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:18:52.369 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:18:52.370 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:18:52.370 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:18:52.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:18:52.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:18:52.371 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:18:52.372 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:18:52.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:18:52.373 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:18:52.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:18:52.374 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:18:52.375 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:18:52.375 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:18:52.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:00:0b:38:54:92:13:9e:55:e6:b4:5a:37:2d:c8:a2:bb:63:62:1c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:23:19.953 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:23:19.955 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:23:19.957 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-10 06:23:19.958 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:23:19.958 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-10 06:23:19.958 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:23:19.959 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:23:19.959 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:23:19.959 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:23:19.959 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:23:19.962 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:23:19.963 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:23:19.963 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:23:19.964 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:23:20.075 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:23:20.076 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:23:20.077 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:23:20.077 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:23:20.078 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:23:20.078 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:23:20.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:23:20.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:23:20.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:23:20.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:23:20.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:23:20.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:23:20.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:23:20.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:23:20.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:23:20.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:23:20.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:0f:0a:84:b9:3b:d0:b0:00:19:20:4b:3d:db:02:91:9f:78:38:79],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:23:38.666 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:23:38.667 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:23:38.668 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-10 06:23:38.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:23:38.669 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-10 06:23:38.669 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:23:38.670 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:23:38.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:23:38.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:23:38.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:23:38.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:23:38.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:23:38.675 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:23:38.675 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:23:38.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:23:38.786 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:23:38.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:23:38.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:23:38.787 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:23:38.788 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:23:38.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:23:38.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:23:38.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:23:38.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:23:38.790 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:23:38.790 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:23:38.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:23:38.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:23:38.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:23:38.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:23:38.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: c2d32742277cdc42e0602a1171ef568881fd43d95820642fd9e0e2157f742c54ad4a628192af2a24a096bfc7a4d0c9a1c251cefc03e9bdb2d87d514afe6d7e90e4a5a90d27575af159f8057f3781924ca3f17c51038e82f6e0f4783b33f5af055857db05e00d1cd8e3bd048998a05a234919403385e5f6ca1e64fdf448f8f2f3df1849fa5c56d1ad807e06d2be3d46e18f4cbb6378d81a75a4c7a1897648d792019bcbeac19896386d509a3472ab534dbfc16c328fdfeb92c0979f0fd9e6b21d9917bd6193ad2c9bfb228f77b087cd6b307fcb8851c1a65d6b0bcce2da06c179d2b5928f039a22daf4afbe3071a528673265086e8ce14005fa56e64aac3fa72bc524142ff6d0edd17f2aecfc08d51b955448e10a784993e3ee52501353d661c9808219e79b7a750beba8236bfe9b81065cf296ee88eed8775417e91b573fc84e599f8220501ce7b7c5641d1e6e836a9b9999b2de220c4b54396163717d9e6ffb22424f963efbbc073cbcd666e16188398dca04ca80cddc9446a8b69d3c4e183b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:f9:ba:5b:cb:1a:63:7b:22:15:b6:39:36:2d:d7:16:54:f2:23:6e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:39:48.427 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:39:48.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:39:48.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-10 06:39:48.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:39:48.434 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-10 06:39:48.435 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:39:48.435 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:39:48.436 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:39:48.436 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:39:48.436 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:39:48.439 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:39:48.440 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:39:48.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:39:48.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:39:48.566 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:39:48.566 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:39:48.567 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:39:48.567 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:39:48.568 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:39:48.568 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:39:48.569 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:39:48.569 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:39:48.569 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:39:48.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:39:48.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:39:48.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:39:48.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:39:48.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:39:48.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:39:48.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:39:48.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:5e:2f:1d:db:69:bc:98:05:9c:56:26:aa:c2:e1:91:7e:55:59:06],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-10 06:39:53.293 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-10 06:39:53.294 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-10 06:39:53.296 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-10 06:39:53.296 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-10 06:39:53.297 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-10 06:39:53.297 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-10 06:39:53.297 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-10 06:39:53.298 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-10 06:39:53.298 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-10 06:39:53.298 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-10 06:39:53.302 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-10 06:39:53.302 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:39:53.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-10 06:39:53.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:39:53.410 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-10 06:39:53.411 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-10 06:39:53.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-10 06:39:53.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-10 06:39:53.413 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-10 06:39:53.413 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-10 06:39:53.414 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:39:53.414 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:39:53.414 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:39:53.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:39:53.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:39:53.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:39:53.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-10 06:39:53.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-10 06:39:53.416 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-10 06:39:53.417 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-10 06:39:53.419 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 87538962260789059915381252635488162605906999365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 10 04:50:04 UTC 2022 Final Date: Sat Oct 09 04:50:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4 02c93bdc016d6f3b9d4f3b4024df3928c5477581 a9c8a13e499d3e712f3cab52ccf2c2352545ac63 c2ba9573b9a545943d3175fb2583b94ed2d340af 6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8 3a86358d23cb855761cc14a38838aa96995e7d9f d49d007a34a1c77d241d02f5147fa3a8f352c029 73480159e918dd70470c9efeb915a6cd6d4f00cd aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd 9417e1f7bfab3fe039a58b987846a6f528a5c7ce 33eeaa8ff48b357ab96ef62a08b9a7094460b0f6 b28665c8209f6bb606f62fa44548f4dd265bb7c4 18838c6d372f7c3756d0eb4f3f34ae47b766815b 0db275cb12646a97f3690105cb6d10db5302c099 8dd522f083773e2d1ceac2a2846018c2a655f804 fd8d97bce1ed852a5629b5b616d441ffa43c46a7 8a9f2a9c1cdf08a3871bf06c049dbf28476a128f 90a6cd044dcc8abb775c775339d93a281e582328 2a11a373e49cd8fbaf4c285a6772a2a9d026538d 77ab33c1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:9a:38:ee:15:04:fe:40:32:b9:78:ab:16:6d:e6:b2:75:1f:48:45],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]