By type
2022-10-30 05:06:53,397 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-30 05:06:54,377 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-30 05:06:55.032 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Oct 30, 2022 5:06:57 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 30, 2022 5:06:57 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 30, 2022 5:06:57 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 30, 2022 5:06:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-30 05:06:57.615 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-30 05:06:57.888 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-10-30 05:06:58.047 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-30 05:06:58.707 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-30 05:06:58.710 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-30 05:06:58.711 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-30 05:06:58.714 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-30 05:06:58.749 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-30 05:06:58.751 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-30 05:06:58.863 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-10-30 05:06:59.443 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 30, 2022 5:07:00 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-30 05:07:00.483 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.866 seconds (JVM running for 9.588) Oct 30, 2022 5:07:23 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-30 05:07:57.846 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 05:07:57.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 05:07:57.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-30 05:07:57.918 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 05:07:57.942 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-30 05:07:57.945 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 05:07:57.947 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 05:07:57.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 05:07:57.950 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 05:07:57.955 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 05:07:57.965 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 05:07:57.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 05:07:58.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 05:07:58.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 05:07:58.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 05:07:58.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 05:07:58.744 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 05:07:58.746 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 05:07:58.747 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 05:07:58.748 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 05:07:58.758 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 05:07:58.759 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 05:07:58.760 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 05:07:58.760 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 05:07:58.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 05:07:58.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 05:07:58.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 05:07:58.779 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 05:07:58.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 05:07:58.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 05:07:58.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 05:07:58.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 05:07:58.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:a3:d9:ba:e4:c9:a4:52:fe:19:1f:a1:be:e2:9e:d8:e1:f6:2c:39],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:25:21.858 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:25:21.862 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:25:21.866 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:25:21.867 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:25:21.868 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:25:21.869 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:25:21.869 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:25:21.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:25:21.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:25:21.871 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:25:21.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:25:21.878 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:25:21.879 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:25:21.879 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:25:22.081 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:25:22.082 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:25:22.082 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:25:22.083 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:25:22.086 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:25:22.086 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:25:22.087 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:25:22.088 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:25:22.088 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:25:22.089 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:25:22.090 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:25:22.090 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:25:22.091 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:25:22.092 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:25:22.092 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:25:22.093 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:25:22.099 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:84:5a:91:bc:54:b9:c6:c4:f3:64:46:7b:e1:ea:85:a1:26:38:da],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:27:09.709 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:27:09.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:27:09.718 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-30 06:27:09.720 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:27:09.722 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-30 06:27:09.725 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:27:09.726 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:27:09.727 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:27:09.728 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:27:09.729 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:27:09.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:27:09.737 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:27:09.738 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:27:09.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:27:09.912 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:27:09.914 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:27:09.914 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:27:09.915 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:27:09.920 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:27:09.923 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:27:09.925 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:27:09.926 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:27:09.926 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:27:09.932 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:27:09.934 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:27:09.936 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:27:09.938 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:27:09.938 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:27:09.939 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:27:09.941 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:27:09.947 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:01:0f:8d:9e:bb:88:bc:81:44:43:24:95:d0:76:38:db:69:3c:b7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:28:09.701 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:28:09.702 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:28:09.703 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-30 06:28:09.704 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:28:09.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-30 06:28:09.705 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:28:09.705 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:28:09.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:28:09.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:28:09.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:28:09.710 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:28:09.710 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:28:09.711 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:28:09.711 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:28:09.943 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:28:09.944 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:28:09.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:28:09.945 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:28:09.947 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:28:09.947 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:28:09.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:28:09.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:28:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:28:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:28:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:28:09.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:28:09.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:28:09.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:28:09.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:28:09.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:28:09.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:ea:ba:37:f9:c2:22:93:fe:44:18:da:72:4c:ae:af:0f:82:cc:55],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:30:13.720 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:30:13.721 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:30:13.722 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:30:13.723 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:30:13.724 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:30:13.724 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:30:13.724 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:30:13.725 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:30:13.725 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:30:13.725 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:30:13.729 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:30:13.729 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:30:13.730 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:30:13.730 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:30:13.856 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:30:13.857 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:30:13.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:30:13.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:30:13.858 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:30:13.859 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:30:13.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:30:13.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:30:13.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:30:13.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:30:13.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:30:13.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:30:13.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:30:13.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:30:13.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:30:13.865 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:30:13.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: a7b730f2e34c0063340230ec020964aa931cf4c1d52f9848a2c8b8a6e4b222ee44d994ca98f3a8419d7cc4158ddfbce2fa777c63bfe3d53631512cacc2b1b995548c7a535366fc33b9e35c11237d877e715a50c0757224a6083dea9f6b7e770fd10b7924425556b60d611288028636c6ff51b329a91267e7645d4067b5849a257eb9d56a47bedd5f4b23226870da90abdec756a580052fa811e426b904c75c3e14e16ac905d328a108d954a9899226c9605ceb9f7b3352ad0a6b49af0a8b7ce5b58fd423fb9e693f867cf42fb582ca10377b9b83f5b43ce4ff2713cd2d649980c151c9af0203bf8edc64cd1bb3f4538894ec2bd00fc0dd1fd9390c8e7618d5064959140e95d2a25c13212c688a6f7a1bbd5f95c7213241024453728b0a5412bc96ea4b5665de08e8247c96ee4edc96d1577736d2ae5fcac55a2e9df8f9e336f5fab24d6fd30757d310e2e83300f66b8ee34991b20cd491ebd499a919b53f0136d9776272a6a6c062da1ed5fe4c709a754ae8420362bf063c4cbde68bc0b90435 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:36:bc:b8:79:d2:14:84:ce:c0:32:16:89:fd:1d:ff:bc:f4:63:fe],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:37:23.090 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:37:23.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:37:23.096 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-30 06:37:23.097 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:37:23.098 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-30 06:37:23.099 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:37:23.099 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:37:23.099 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:37:23.100 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:37:23.100 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:37:23.106 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:37:23.107 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:37:23.108 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:37:23.108 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:37:23.289 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:37:23.289 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:37:23.290 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:37:23.290 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:37:23.291 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:37:23.292 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:37:23.292 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:37:23.292 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:37:23.292 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:37:23.293 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:37:23.294 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:37:23.294 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:37:23.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:37:23.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:37:23.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:37:23.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:37:23.300 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:34:f2:70:91:81:1e:0f:00:bc:c1:08:4e:e2:cc:18:94:9e:11:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:42:21.627 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:42:21.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:42:21.632 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 06:42:21.633 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:42:21.634 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 06:42:21.634 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:42:21.635 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:42:21.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:42:21.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:42:21.636 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:42:21.640 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:42:21.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:42:21.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:42:21.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:21.786 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:42:21.786 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:42:21.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:42:21.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:21.788 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:42:21.789 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:42:21.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:21.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:21.790 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:21.790 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:21.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:21.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:21.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:21.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:21.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:21.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:42:21.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: a7b730f2e34c0063340230ec020964aa931cf4c1d52f9848a2c8b8a6e4b222ee44d994ca98f3a8419d7cc4158ddfbce2fa777c63bfe3d53631512cacc2b1b995548c7a535366fc33b9e35c11237d877e715a50c0757224a6083dea9f6b7e770fd10b7924425556b60d611288028636c6ff51b329a91267e7645d4067b5849a257eb9d56a47bedd5f4b23226870da90abdec756a580052fa811e426b904c75c3e14e16ac905d328a108d954a9899226c9605ceb9f7b3352ad0a6b49af0a8b7ce5b58fd423fb9e693f867cf42fb582ca10377b9b83f5b43ce4ff2713cd2d649980c151c9af0203bf8edc64cd1bb3f4538894ec2bd00fc0dd1fd9390c8e7618d5064959140e95d2a25c13212c688a6f7a1bbd5f95c7213241024453728b0a5412bc96ea4b5665de08e8247c96ee4edc96d1577736d2ae5fcac55a2e9df8f9e336f5fab24d6fd30757d310e2e83300f66b8ee34991b20cd491ebd499a919b53f0136d9776272a6a6c062da1ed5fe4c709a754ae8420362bf063c4cbde68bc0b90435 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:b9:58:40:3a:be:b1:f5:18:33:1f:57:d4:99:23:19:84:97:bc:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:42:37.368 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 06:42:37.369 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 06:42:37.371 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 06:42:37.371 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:42:37.372 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 06:42:37.372 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 06:42:37.373 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 06:42:37.373 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 06:42:37.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 06:42:37.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 06:42:37.378 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 06:42:37.379 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:42:37.379 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 06:42:37.379 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:37.495 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 06:42:37.495 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 06:42:37.496 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 06:42:37.496 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:37.498 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 06:42:37.498 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 06:42:37.498 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:37.499 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:37.499 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:37.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:37.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:37.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:37.501 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:37.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:37.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:37.503 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:42:37.506 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:49:d4:57:0a:67:37:c7:73:ec:e9:09:7c:a1:3a:b6:0a:10:61:6a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 07:01:05.171 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 07:01:05.175 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 07:01:05.177 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 07:01:05.178 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 07:01:05.179 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 07:01:05.179 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 07:01:05.180 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 07:01:05.180 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 07:01:05.181 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 07:01:05.181 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 07:01:05.185 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 07:01:05.187 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 07:01:05.187 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 07:01:05.188 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:05.340 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 07:01:05.340 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 07:01:05.341 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 07:01:05.341 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:05.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 07:01:05.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 07:01:05.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:05.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:05.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:05.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:05.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:05.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:05.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:05.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:05.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:05.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 07:01:05.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:b0:e2:f3:7f:6c:6b:35:d7:25:f9:55:a2:7c:da:ab:9b:d2:34:99],[56:66:d1:a4] modulus: f5b025eef93099c24dd60af6f3e14a6873423cb3c3604fb3f6fa9752387da3114d2b31de8a8e3e640f8cad34993fa98f3d209b5d49e8f2dc00d8a0d86d6fdb18947f433193cf6c4a84e10ca665da2cf469d407bcb1f941730c88e27c9399e38746c72d2516a421b0c76b46577a2f124b9bc3d00f4df6849d2b6862d8810fbf57e94c22a0020ec0c0a683536482751049778c840301b01f8624231bf7e8745e5e335aba42c0a0c5cdb55b8ebdd2b41829b0270503428769c7cbae12aa643b5b6842e00e86c304126871a717a25f196b98b2a80e04639b9e9fd17f3a362935dde56218039b6fa730767cb0b0c7625fdace292f3ba25a86e0c94c528b310c5ce495 public exponent: 10001 ] 2022-10-30 07:01:10.238 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-30 07:01:10.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-30 07:01:10.240 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 07:01:10.241 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 07:01:10.242 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 07:01:10.243 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-30 07:01:10.243 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-30 07:01:10.244 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-30 07:01:10.245 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-30 07:01:10.246 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-30 07:01:10.249 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-30 07:01:10.249 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 07:01:10.250 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-30 07:01:10.251 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:10.404 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-30 07:01:10.405 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-30 07:01:10.405 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-30 07:01:10.406 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:10.407 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-30 07:01:10.407 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-30 07:01:10.408 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:10.408 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:10.408 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:10.410 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:10.411 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:10.411 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:10.412 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:10.412 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:10.412 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:10.413 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 07:01:10.416 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:28:4d:99:7c:92:09:40:7c:78:96:42:15:2e:6d:78:2c:11:73:a8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]