By type
2022-11-10 05:00:24,776 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-10 05:00:26,167 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-10 05:00:26.944 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 10, 2022 5:00:29 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 10, 2022 5:00:29 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 10, 2022 5:00:29 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 10, 2022 5:00:29 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-10 05:00:29.761 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-10 05:00:30.050 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-10 05:00:30.222 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-10 05:00:31.001 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-10 05:00:31.003 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-10 05:00:31.005 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-10 05:00:31.009 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-10 05:00:31.047 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-10 05:00:31.050 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-10 05:00:31.182 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-10 05:00:32.030 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 10, 2022 5:00:32 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-10 05:00:32.987 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.176 seconds (JVM running for 10.995) Nov 10, 2022 5:00:58 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-10 05:02:01.698 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 05:02:01.714 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 05:02:01.774 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-10 05:02:01.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 05:02:01.802 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-10 05:02:01.805 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 05:02:01.807 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 05:02:01.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 05:02:01.809 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 05:02:01.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 05:02:01.824 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 05:02:01.828 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 05:02:01.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 05:02:01.898 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 05:02:01.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 05:02:01.904 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 05:02:02.615 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 05:02:02.619 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 05:02:02.619 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 05:02:02.621 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 05:02:02.632 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 05:02:02.633 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 05:02:02.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 05:02:02.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 05:02:02.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 05:02:02.651 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 05:02:02.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 05:02:02.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 05:02:02.659 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 05:02:02.659 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 05:02:02.660 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 05:02:02.661 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 05:02:02.715 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 95172709e5868a1738f2e2c31e71cc0d8cf9ae890218aaef6a9697c66a67363c7e636e68ac442d2b8bdef4251ae5b803c9b98139966f29b4d5cb4037393873d7db76ea3201f3a0f39f27cd0883e866814b80c3b813d0591eb23b881fa6ec03d0a2c88d2336900a2218eca368dff1c42c645c217c597200d13039657ab3691dd08df1552733d4bbeb6ac6d91797d0ff7292109536b94f465e03578cc10499a01f1ef37ef1469d9daf714ac0c0e96c6d73e6907d695a39be8c2402722bbed841d602692966f4ba7fa470dababd0086a45891db9fdc9ed418044335e540163648feb51f3716adc2d22d66aac737a958890a95d1fc1da4497fc1833eb21e98460f80f79d130636cad4f84308cdd5766288e45661cbfe586ce85e10a2b787484b6af47223ff5f7054df82837435b689da622af7fb66219c4b99ab4bb8066a02e49983ee82e1e3135fbaecbd530649873057823195fecaa2c58c9b55550ca7d51954c539fd9fc2c2af5363d844c57eb6fd183a114d1e6b22359bfae8a59197de1fc7e1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a8:ec:f1:37:8a:de:02:76:e2:95:9f:15:41:a2:f8:62:2a:5e:f4:a7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:23:52.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:23:52.190 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:23:52.194 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-10 06:23:52.196 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:23:52.198 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-10 06:23:52.199 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:23:52.200 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:23:52.201 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:23:52.201 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:23:52.202 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:23:52.207 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:23:52.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:23:52.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:23:52.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:23:52.430 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:23:52.431 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:23:52.431 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:23:52.431 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:23:52.441 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:23:52.442 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:23:52.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:23:52.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:23:52.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:23:52.445 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:23:52.445 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:23:52.446 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:23:52.447 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:23:52.447 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:23:52.447 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:23:52.448 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:23:52.455 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:ef:be:5b:d7:ef:f5:fc:95:ee:e2:9d:b8:4e:a3:ac:3b:43:a7:b4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:25:40.074 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:25:40.076 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:25:40.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-10 06:25:40.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:25:40.079 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-10 06:25:40.080 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:25:40.080 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:25:40.081 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:25:40.081 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:25:40.086 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:25:40.105 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:25:40.106 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:25:40.107 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:25:40.107 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:25:40.257 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:25:40.258 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:25:40.258 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:25:40.259 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:25:40.261 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:25:40.261 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:25:40.262 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:25:40.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:25:40.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:25:40.264 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:25:40.264 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:25:40.265 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:25:40.266 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:25:40.266 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:25:40.266 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:25:40.267 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:25:40.271 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:3b:84:01:80:71:12:cc:fa:6a:4f:84:80:ac:7e:97:3f:e3:7c:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:26:35.978 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:26:35.979 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:26:35.981 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-10 06:26:35.982 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:26:35.982 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-10 06:26:35.983 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:26:35.983 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:26:35.984 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:26:35.984 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:26:35.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:26:35.989 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:26:35.990 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:26:35.990 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:26:35.990 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:26:36.120 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:26:36.121 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:26:36.121 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:26:36.121 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:26:36.123 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:26:36.124 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:26:36.124 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:26:36.125 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:26:36.125 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:26:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:26:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:26:36.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:26:36.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:26:36.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:26:36.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:26:36.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:26:36.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:88:46:dd:c2:f6:0b:43:45:e7:03:1c:37:4d:90:f2:f3:6a:72:89],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:28:36.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:28:36.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:28:36.791 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-10 06:28:36.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:28:36.793 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-10 06:28:36.794 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:28:36.795 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:28:36.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:28:36.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:28:36.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:28:36.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:28:36.803 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:28:36.804 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:28:36.804 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:28:36.979 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:28:36.980 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:28:36.980 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:28:36.981 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:28:36.982 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:28:36.983 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:28:36.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:28:36.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:28:36.985 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:28:36.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:28:36.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:28:36.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:28:36.988 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:28:36.989 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:28:36.989 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:28:36.990 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:28:36.994 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:c0:58:3b:af:18:6c:c8:af:16:8c:23:d2:5b:c5:01:34:1d:1d:9a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:41:56.940 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:41:56.944 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:41:56.948 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-10 06:41:56.949 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:41:56.950 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-10 06:41:56.950 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:41:56.951 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:41:56.951 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:41:56.952 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:41:56.953 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:41:56.961 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:41:56.962 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:41:56.962 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:41:56.963 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:41:57.117 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:41:57.117 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:41:57.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:41:57.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:41:57.120 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:41:57.120 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:41:57.121 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:41:57.121 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:41:57.122 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:41:57.123 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:41:57.124 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:41:57.124 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:41:57.125 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:41:57.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:41:57.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:41:57.127 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:41:57.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 95172709e5868a1738f2e2c31e71cc0d8cf9ae890218aaef6a9697c66a67363c7e636e68ac442d2b8bdef4251ae5b803c9b98139966f29b4d5cb4037393873d7db76ea3201f3a0f39f27cd0883e866814b80c3b813d0591eb23b881fa6ec03d0a2c88d2336900a2218eca368dff1c42c645c217c597200d13039657ab3691dd08df1552733d4bbeb6ac6d91797d0ff7292109536b94f465e03578cc10499a01f1ef37ef1469d9daf714ac0c0e96c6d73e6907d695a39be8c2402722bbed841d602692966f4ba7fa470dababd0086a45891db9fdc9ed418044335e540163648feb51f3716adc2d22d66aac737a958890a95d1fc1da4497fc1833eb21e98460f80f79d130636cad4f84308cdd5766288e45661cbfe586ce85e10a2b787484b6af47223ff5f7054df82837435b689da622af7fb66219c4b99ab4bb8066a02e49983ee82e1e3135fbaecbd530649873057823195fecaa2c58c9b55550ca7d51954c539fd9fc2c2af5363d844c57eb6fd183a114d1e6b22359bfae8a59197de1fc7e1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:58:37:50:6b:5e:bb:e6:99:0c:3a:3d:dc:6a:e9:fa:70:98:5d:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:47:11.564 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:47:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:47:11.579 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-10 06:47:11.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:47:11.585 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-10 06:47:11.586 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:47:11.587 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:47:11.587 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:47:11.588 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:47:11.589 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:47:11.595 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:47:11.599 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:47:11.599 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:47:11.599 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:47:11.861 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:47:11.862 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:47:11.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:47:11.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:47:11.865 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:47:11.866 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:47:11.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:47:11.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:47:11.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:47:11.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:47:11.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:47:11.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:47:11.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:47:11.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:47:11.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:47:11.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:47:11.876 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:eb:24:b1:1d:7f:d0:61:9c:6c:5e:b0:18:5c:8d:4e:9a:c7:00:ee],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 06:47:28.617 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 06:47:28.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 06:47:28.620 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-10 06:47:28.620 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 06:47:28.621 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-10 06:47:28.621 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 06:47:28.622 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 06:47:28.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 06:47:28.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 06:47:28.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 06:47:28.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 06:47:28.627 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:47:28.627 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 06:47:28.627 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:47:28.759 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 06:47:28.760 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 06:47:28.760 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 06:47:28.760 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 06:47:28.762 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 06:47:28.762 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 06:47:28.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:47:28.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:47:28.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:47:28.764 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:47:28.764 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:47:28.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:47:28.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 06:47:28.766 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 06:47:28.766 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 06:47:28.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 06:47:28.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:f3:ae:66:c1:c7:fd:9a:7a:ff:53:56:05:4d:b7:99:b0:9a:b6:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 07:07:20.588 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 07:07:20.592 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 07:07:20.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-10 07:07:20.596 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 07:07:20.596 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-10 07:07:20.597 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 07:07:20.598 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 07:07:20.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 07:07:20.599 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 07:07:20.599 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 07:07:20.604 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 07:07:20.606 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 07:07:20.606 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 07:07:20.607 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 07:07:20.756 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 07:07:20.756 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 07:07:20.757 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 07:07:20.757 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 07:07:20.759 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 07:07:20.759 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 07:07:20.760 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 07:07:20.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 07:07:20.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 07:07:20.762 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 07:07:20.762 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 07:07:20.763 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 07:07:20.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 07:07:20.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 07:07:20.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 07:07:20.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 07:07:20.769 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:6e:33:1a:43:a9:a9:8f:4e:0a:47:2c:b9:9f:4e:5d:43:22:8a:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-10 07:07:37.529 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-10 07:07:37.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-10 07:07:37.534 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-10 07:07:37.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-10 07:07:37.535 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-10 07:07:37.536 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-10 07:07:37.536 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-10 07:07:37.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-10 07:07:37.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-10 07:07:37.538 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-10 07:07:37.541 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-10 07:07:37.542 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 07:07:37.542 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-10 07:07:37.542 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 07:07:37.662 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-10 07:07:37.662 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-10 07:07:37.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-10 07:07:37.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-10 07:07:37.664 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-10 07:07:37.664 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-10 07:07:37.665 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 07:07:37.665 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 07:07:37.665 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 07:07:37.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 07:07:37.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 07:07:37.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 07:07:37.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-10 07:07:37.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-10 07:07:37.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-10 07:07:37.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-10 07:07:37.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 101641184893618827315282342292109302565671834315 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 10 04:58:02 UTC 2022 Final Date: Tue Nov 09 04:58:01 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [01:ca:f2:9c:8c:46:ca:6b:f7:f0:ce:37:e3:11:ad:ba:e8:3d:ae:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1fc0033ce1668f0ea6e71b74e508039809e22907 8f205f4ac463dc8dc346ed1c19397bad47927795 4c3b4ab873412d0d1fc9ab9afeec0342d1ff3e8e 417cc169bef702b1313bac8b69f01dea71601dc7 13532bdc856ab38f7396d79fbf9fb13b619b0c26 c3fe4f43280a5c48e0fc78d93c875a1af5695cd1 0664ae76c6360f5902b0cc42acd0ec03efb6e8d7 7cc417036f128aa04f5a34066c320e001013dd11 c774fb376e5bb410549d395526b488ce6d4865d1 64f6ad632dbec9dc93c2744d29333424ff2ee86e 7ffdaa35e776593c059d44ea55f4718264258335 7a2d8dacc07e7637d7bd966b484be18acf315c4e ff43611fffbc871dcdb5aafed4f818e501ce25da aaec77133380a167de19883bd4c3015caf5bab85 516bdcdcaf13d0ef10731157ca1f3d5bc34c9351 b3d1c69bd7294a5a42623454e46f314e40dd7bdf e512c683e7dcbd4b30ca49c4f6ca00719875b385 7d11df20e6b64a31eeef2b7c5c226ba61396dae1 187ec6adcc8f5cd618a286d69dba02843cfcc15e 8d585448 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:cf:f3:05:83:9d:cf:d8:a0:29:17:b9:00:28:12:8b:45:53:46:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]