By type
2022-11-07 05:05:25,084 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-07 05:05:25,980 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-07 05:05:26.701 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 07, 2022 5:05:28 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 07, 2022 5:05:28 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 07, 2022 5:05:28 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 07, 2022 5:05:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-07 05:05:29.241 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-07 05:05:29.535 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-07 05:05:29.712 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-07 05:05:30.453 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-07 05:05:30.456 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-07 05:05:30.457 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-07 05:05:30.463 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-07 05:05:30.504 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-07 05:05:30.508 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-07 05:05:30.643 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-07 05:05:31.216 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 07, 2022 5:05:31 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-07 05:05:32.177 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.839 seconds (JVM running for 9.569) Nov 07, 2022 5:06:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-07 05:06:17.303 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 05:06:17.312 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 05:06:17.361 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-07 05:06:17.364 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 05:06:17.379 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-07 05:06:17.381 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 05:06:17.382 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 05:06:17.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 05:06:17.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 05:06:17.387 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 05:06:17.395 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 05:06:17.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 05:06:17.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 05:06:17.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 05:06:17.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 05:06:17.460 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 05:06:18.291 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 05:06:18.295 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 05:06:18.296 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 05:06:18.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 05:06:18.307 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 05:06:18.308 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 05:06:18.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 05:06:18.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 05:06:18.310 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 05:06:18.326 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 05:06:18.326 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 05:06:18.327 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 05:06:18.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 05:06:18.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 05:06:18.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 05:06:18.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 05:06:18.368 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: b7d44bede92b44c6e06f448e318c8e2c712e35d2417bc6d31e30f74df6ea2a4796bad028e42446fe8f03704e3fabdeb65df0b0e0b3099977c850798d1513d5ebbf3373bc94998e99cfcebbecfec47f7b034974a4bcc43f08f29ae3337e3120bf4c190cdfa38e9427ae87a40daa2ba9100246561d8d2f51ca22763e23bdd72ad4e096392494766338665dbf00d0cdb7fb21059a4664c9e782e31fd65d4e494e0437e2111ff3be4173afc9840ce966c00209413f9d717a657ea040586f426de1802fc02faa2b049307c9b741ca54d84f7212e91ce6f60bc5f1df453e11fd8d1b32c4b2b924f2a83e0b0c80c5eaae62382527a0196b8864402009f761c95a0966520d9f133ff98da1663601e08573344741b2d6247fd62c8a926742de4d8a5dd4caad616f5fda15724c5c06beb5a106704bd1a053e04e95d9e9d42fc946ad851fe862d54296ebbd2c3350450ce07d1687248413b623c81ca17ebe3103ff28e6638bbd8fd832bddf8c48444c100101a7980a0308f09bea44eb17deaa78289dc2fdbf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:37:91:96:b7:e8:6d:ed:2c:d1:fb:d2:4d:fe:1d:ea:2e:5e:fc:d6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 06:24:54.315 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:24:54.318 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:24:54.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-07 06:24:54.323 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:24:54.324 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-07 06:24:54.325 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:24:54.325 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:24:54.326 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:24:54.327 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:24:54.327 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:24:54.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:24:54.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:24:54.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:24:54.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:24:54.571 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:24:54.572 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:24:54.572 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:24:54.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:24:54.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:24:54.576 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:24:54.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:24:54.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:24:54.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:24:54.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:24:54.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:24:54.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:24:54.583 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:24:54.583 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:24:54.584 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:24:54.585 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:24:54.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:e5:2e:41:cf:7f:d9:fc:31:00:19:83:a3:7a:bd:83:4d:b3:9b:e8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 06:26:42.307 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:26:42.310 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:26:42.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-07 06:26:42.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:26:42.315 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-07 06:26:42.316 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:26:42.316 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:26:42.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:26:42.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:26:42.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:26:42.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:26:42.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:26:42.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:26:42.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:26:42.504 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:26:42.504 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:26:42.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:26:42.505 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:26:42.507 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:26:42.507 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:26:42.508 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:26:42.508 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:26:42.508 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:26:42.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:26:42.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:26:42.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:26:42.511 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:26:42.512 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:26:42.512 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:26:42.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:26:42.517 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: b7d44bede92b44c6e06f448e318c8e2c712e35d2417bc6d31e30f74df6ea2a4796bad028e42446fe8f03704e3fabdeb65df0b0e0b3099977c850798d1513d5ebbf3373bc94998e99cfcebbecfec47f7b034974a4bcc43f08f29ae3337e3120bf4c190cdfa38e9427ae87a40daa2ba9100246561d8d2f51ca22763e23bdd72ad4e096392494766338665dbf00d0cdb7fb21059a4664c9e782e31fd65d4e494e0437e2111ff3be4173afc9840ce966c00209413f9d717a657ea040586f426de1802fc02faa2b049307c9b741ca54d84f7212e91ce6f60bc5f1df453e11fd8d1b32c4b2b924f2a83e0b0c80c5eaae62382527a0196b8864402009f761c95a0966520d9f133ff98da1663601e08573344741b2d6247fd62c8a926742de4d8a5dd4caad616f5fda15724c5c06beb5a106704bd1a053e04e95d9e9d42fc946ad851fe862d54296ebbd2c3350450ce07d1687248413b623c81ca17ebe3103ff28e6638bbd8fd832bddf8c48444c100101a7980a0308f09bea44eb17deaa78289dc2fdbf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:0c:a6:92:74:91:c4:9a:5e:4e:76:57:61:11:54:ac:32:69:5e:e5],[56:66:d1:a4] modulus: f61d15dd95bf1383e25dcef7ff83fd893d243ec92247bd34649fb1bec74ffb06e1ff31f0529d3c1038f467a3dc3999c24067ce4a082d7b1b3f3673a29f83e603cf7962a22c60e3832b830d3881f7ef5b0516f0c37d384aa7e930dd5b7694c6a844284351440dc4645743fcedb948ab14e0ac64692e08f4e2051849396f80c79f2834aeeb1e561d40457612bba8489ad1a7c234d739c1ad80ec7fa9ed6e3369d5083250ae88152903363a059ee4d94431e58e5683dca11caf387d579bef01dc734f71752c0edd7ec1ac36f2886d24b0438603a4055659302b206a8f7806ca4afd9efbf5eedc2b1ebe7eb630d788c91d7fffb7bf0c8ffdc45952512ae5e3e6d1a9 public exponent: 10001 ] 2022-11-07 06:27:42.551 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:27:42.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:27:42.590 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-07 06:27:42.605 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:27:42.606 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-07 06:27:42.606 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:27:42.607 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:27:42.607 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:27:42.608 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:27:42.609 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:27:42.617 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:27:42.618 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:27:42.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:27:42.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:27:42.748 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:27:42.758 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:27:42.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:27:42.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:27:42.779 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:27:42.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:27:42.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:27:42.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:27:42.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:27:42.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:27:42.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:27:42.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:27:42.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:27:42.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:27:42.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:27:42.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:27:42.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:cd:0e:84:b2:a3:1c:d4:ae:87:c7:28:c0:8d:3d:54:f4:1c:c9:44],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 06:29:37.431 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:29:37.433 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:29:37.434 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-07 06:29:37.435 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:29:37.435 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-07 06:29:37.436 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:29:37.436 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:29:37.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:29:37.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:29:37.438 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:29:37.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:29:37.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:29:37.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:29:37.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:29:37.595 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:29:37.596 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:29:37.596 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:29:37.597 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:29:37.599 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:29:37.600 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:29:37.602 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:29:37.602 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:29:37.603 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:29:37.606 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:29:37.606 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:29:37.610 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:29:37.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:29:37.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:29:37.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:29:37.622 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:29:37.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:1b:70:45:30:33:d7:c7:3a:47:2d:8b:97:b6:c9:18:f4:8c:9c:f4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 06:44:19.667 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:44:19.670 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:44:19.672 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-07 06:44:19.673 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:44:19.674 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-07 06:44:19.675 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:44:19.675 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:44:19.676 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:44:19.676 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:44:19.677 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:44:19.682 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:44:19.683 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:44:19.683 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:44:19.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:44:19.854 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:44:19.855 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:44:19.855 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:44:19.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:44:19.857 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:44:19.858 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:44:19.858 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:44:19.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:44:19.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:44:19.860 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:44:19.860 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:44:19.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:44:19.862 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:44:19.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:44:19.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:44:19.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:44:19.874 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:dc:f7:06:3a:dd:79:91:8d:36:ae:16:21:ef:5c:16:33:94:d0:9d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 06:49:17.513 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:49:17.518 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:49:17.524 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-07 06:49:17.526 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:49:17.526 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-07 06:49:17.527 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:49:17.528 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:49:17.528 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:49:17.528 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:49:17.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:49:17.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:49:17.536 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:49:17.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:49:17.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:49:17.690 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:49:17.690 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:49:17.691 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:49:17.691 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:49:17.693 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:49:17.693 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:49:17.693 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:49:17.694 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:49:17.694 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:49:17.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:49:17.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:49:17.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:49:17.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:49:17.697 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:49:17.697 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:49:17.698 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:49:17.701 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:d0:ef:a3:aa:9e:10:aa:10:ac:b0:4f:e7:01:55:c7:cd:c7:a2:09],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 06:49:35.005 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 06:49:35.007 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 06:49:35.009 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-07 06:49:35.009 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 06:49:35.010 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-07 06:49:35.011 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 06:49:35.011 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 06:49:35.012 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 06:49:35.012 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 06:49:35.013 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 06:49:35.019 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 06:49:35.019 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:49:35.020 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 06:49:35.021 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:49:35.160 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 06:49:35.161 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 06:49:35.162 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 06:49:35.162 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 06:49:35.163 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 06:49:35.164 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 06:49:35.164 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:49:35.165 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:49:35.165 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:49:35.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:49:35.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:49:35.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:49:35.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 06:49:35.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 06:49:35.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 06:49:35.169 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 06:49:35.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:58:5d:91:39:32:2a:66:2d:9f:24:f0:2e:cb:26:e1:d9:cb:58:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 07:09:41.187 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 07:09:41.190 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 07:09:41.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-07 07:09:41.194 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 07:09:41.195 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-07 07:09:41.195 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 07:09:41.196 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 07:09:41.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 07:09:41.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 07:09:41.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 07:09:41.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 07:09:41.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 07:09:41.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 07:09:41.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 07:09:41.365 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 07:09:41.366 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 07:09:41.366 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 07:09:41.367 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 07:09:41.369 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 07:09:41.369 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 07:09:41.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 07:09:41.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 07:09:41.371 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 07:09:41.372 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 07:09:41.372 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 07:09:41.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 07:09:41.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 07:09:41.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 07:09:41.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 07:09:41.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 07:09:41.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: b7d44bede92b44c6e06f448e318c8e2c712e35d2417bc6d31e30f74df6ea2a4796bad028e42446fe8f03704e3fabdeb65df0b0e0b3099977c850798d1513d5ebbf3373bc94998e99cfcebbecfec47f7b034974a4bcc43f08f29ae3337e3120bf4c190cdfa38e9427ae87a40daa2ba9100246561d8d2f51ca22763e23bdd72ad4e096392494766338665dbf00d0cdb7fb21059a4664c9e782e31fd65d4e494e0437e2111ff3be4173afc9840ce966c00209413f9d717a657ea040586f426de1802fc02faa2b049307c9b741ca54d84f7212e91ce6f60bc5f1df453e11fd8d1b32c4b2b924f2a83e0b0c80c5eaae62382527a0196b8864402009f761c95a0966520d9f133ff98da1663601e08573344741b2d6247fd62c8a926742de4d8a5dd4caad616f5fda15724c5c06beb5a106704bd1a053e04e95d9e9d42fc946ad851fe862d54296ebbd2c3350450ce07d1687248413b623c81ca17ebe3103ff28e6638bbd8fd832bddf8c48444c100101a7980a0308f09bea44eb17deaa78289dc2fdbf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:81:5d:75:b9:87:25:ac:0a:a1:8a:e5:ae:7f:f1:57:ae:5f:a6:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-07 07:09:47.950 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-07 07:09:47.951 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-07 07:09:47.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-07 07:09:47.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-07 07:09:47.952 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-07 07:09:47.953 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-07 07:09:47.953 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-07 07:09:47.953 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-07 07:09:47.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-07 07:09:47.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-07 07:09:47.957 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-07 07:09:47.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 07:09:47.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-07 07:09:47.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 07:09:48.077 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-07 07:09:48.078 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-07 07:09:48.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-07 07:09:48.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-07 07:09:48.080 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-07 07:09:48.080 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-07 07:09:48.080 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 07:09:48.081 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 07:09:48.081 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 07:09:48.082 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 07:09:48.082 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 07:09:48.082 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 07:09:48.083 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-07 07:09:48.083 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-07 07:09:48.083 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-07 07:09:48.084 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-07 07:09:48.087 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 529422261667631736617556737321301468915283624526 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 07 05:02:41 UTC 2022 Final Date: Sat Nov 06 05:02:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc 9ffd5b990f4e138d6e929311acdbd2165821d348 ed5ef6a9c3e3aa28c0a844c132fa0539010627eb 1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8 2fd60990748d9c449400c0da0522854ba3967229 13539c2dc04fa8f2b96a5be852484465e830d2fc ca3ded7e469a23309b713e76c774faf25af01a9d 7b043f3756e3c8e6b1245abc220a67be4bb2bc56 03e8572e89bba30e547f416ad3bf8565cf9d081c 03ce9ce8804e05b43a509bc8bcfdc21a1c27f952 988596b1d142e885848b7c09402f3d335b3c026d bc310fe85d12f5e1e15f2822b3a3451a6c371a8f 929338459dc0275e8787d57b3d630281f451a264 ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9 62bcaf40c0852a680524b933bca75448c98448cf a0178386297d7f737efa6734d990d0bb8c21be08 f902cb967aeaff01d8114c157bc0a5bf41581f77 9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb 8069eae84003f81e5a9f0704b10f517d31869f18 e20b79df Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:a1:c6:54:cc:21:ef:b4:23:60:9b:d4:96:93:4f:46:e1:78:77:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]