By type
2022-11-12 05:03:12,065 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-12 05:03:13,027 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-12 05:03:13.827 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 12, 2022 5:03:15 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 12, 2022 5:03:15 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 12, 2022 5:03:15 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 12, 2022 5:03:15 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-12 05:03:16.444 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-12 05:03:16.726 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-12 05:03:16.898 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-12 05:03:17.696 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-12 05:03:17.699 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-12 05:03:17.700 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-12 05:03:17.704 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-12 05:03:17.745 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-12 05:03:17.749 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-12 05:03:17.877 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-12 05:03:18.650 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 12, 2022 5:03:19 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-12 05:03:19.737 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.476 seconds (JVM running for 10.365) Nov 12, 2022 5:03:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-12 05:04:00.453 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 05:04:00.461 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 05:04:00.510 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-12 05:04:00.515 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 05:04:00.530 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-12 05:04:00.532 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 05:04:00.533 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 05:04:00.534 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 05:04:00.535 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 05:04:00.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 05:04:00.555 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 05:04:00.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 05:04:00.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 05:04:00.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 05:04:00.627 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 05:04:00.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 05:04:01.465 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 05:04:01.467 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 05:04:01.467 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 05:04:01.469 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 05:04:01.478 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 05:04:01.479 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 05:04:01.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 05:04:01.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 05:04:01.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 05:04:01.495 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 05:04:01.496 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 05:04:01.496 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 05:04:01.501 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 05:04:01.502 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 05:04:01.502 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 05:04:01.503 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 05:04:01.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:c4:98:23:03:bc:27:b2:1e:77:92:3f:83:db:6d:99:54:96:e9:99],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-12 06:24:30.054 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:24:30.059 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:24:30.065 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-12 06:24:30.067 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:24:30.068 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-12 06:24:30.070 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:24:30.071 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:24:30.072 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:24:30.073 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:24:30.074 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:24:30.101 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:24:30.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:24:30.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:24:30.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:24:30.332 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:24:30.333 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:24:30.334 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:24:30.334 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:24:30.337 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:24:30.338 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:24:30.339 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:24:30.339 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:24:30.340 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:24:30.341 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:24:30.342 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:24:30.343 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:24:30.344 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:24:30.345 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:24:30.345 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:24:30.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:24:30.351 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:66:46:3b:f7:46:17:53:6b:ef:da:b1:b0:c8:67:7d:71:87:ad:2f],[56:66:d1:a4] modulus: c01f44c8e73cd77ce030fa0a480cd17cc0de56756a0071aa91b778aeb31b2f72a15a2614a84b04e655ee7bad5ea6e1a8801000c2b30f76d3d1f66de261d5f27ba01f0c476cacb825eaec95268c1bdc3ac8a0ecf576fa20742f951c60f0fceb92fcf36f663a298be167d96761b54854b24624c26a49c716d4e329aecaab7f6c6372b0aa1be2f4b16fcb1d53b226bcc65ce14b5c60825c3628141f0a4616c34cb64a8b04872e5ce25abf379933a928858da384b9b0ef5c8bdf58cf7a5acabc96b064daf28bca1e5837bbfe5ff683d7815c1381121d0fe962af404cd6ebecf1bf37b4e9e06d909d8233021d469579a6380b2a0d1a249c0ef4e1579bc455ec0d9631 public exponent: 10001 ] 2022-11-12 06:26:02.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:26:02.170 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:26:02.172 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-12 06:26:02.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:26:02.173 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-12 06:26:02.174 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:26:02.175 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:26:02.175 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:26:02.176 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:26:02.177 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:26:02.182 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:26:02.182 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:26:02.183 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:26:02.183 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:26:02.345 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:26:02.346 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:26:02.347 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:26:02.347 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:26:02.350 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:26:02.350 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:26:02.351 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:26:02.351 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:26:02.352 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:26:02.353 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:26:02.353 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:26:02.354 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:26:02.355 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:26:02.355 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:26:02.356 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:26:02.357 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:26:02.361 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:73:c4:48:32:3a:d4:31:15:38:c0:dd:41:76:1d:33:3e:34:e8:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-12 06:27:23.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:27:23.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:27:23.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-12 06:27:23.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:27:23.347 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-12 06:27:23.348 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:27:23.349 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:27:23.349 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:27:23.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:27:23.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:27:23.354 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:27:23.355 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:27:23.355 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:27:23.356 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:27:23.553 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:27:23.554 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:27:23.555 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:27:23.557 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:27:23.559 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:27:23.560 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:27:23.561 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:27:23.561 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:27:23.562 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:27:23.563 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:27:23.564 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:27:23.564 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:27:23.566 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:27:23.567 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:27:23.568 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:27:23.569 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:27:23.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:38:15:55:cb:98:85:e2:70:46:6b:5e:aa:1c:fc:13:e4:0d:49:7f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-12 06:29:59.135 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:29:59.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:29:59.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-12 06:29:59.140 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:29:59.141 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-12 06:29:59.142 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:29:59.142 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:29:59.143 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:29:59.143 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:29:59.144 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:29:59.148 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:29:59.149 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:29:59.149 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:29:59.149 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:29:59.319 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:29:59.320 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:29:59.320 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:29:59.321 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:29:59.323 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:29:59.323 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:29:59.324 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:29:59.325 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:29:59.325 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:29:59.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:29:59.327 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:29:59.327 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:29:59.328 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:29:59.328 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:29:59.329 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:29:59.330 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:29:59.334 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:1c:36:34:39:9e:68:2d:6e:07:35:6f:8d:2f:18:3c:ec:2c:3e:f4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-12 06:43:48.060 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:43:48.064 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:43:48.068 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-12 06:43:48.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:43:48.070 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-12 06:43:48.071 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:43:48.072 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:43:48.072 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:43:48.073 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:43:48.074 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:43:48.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:43:48.104 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:43:48.104 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:43:48.105 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:43:48.328 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:43:48.329 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:43:48.329 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:43:48.329 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:43:48.332 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:43:48.332 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:43:48.332 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:43:48.333 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:43:48.333 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:43:48.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:43:48.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:43:48.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:43:48.335 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:43:48.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:43:48.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:43:48.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:43:48.340 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:a2:36:5e:62:ad:67:83:3b:f1:63:1d:db:9f:ac:da:34:89:d2:07],[56:66:d1:a4] modulus: b1997ad546c70cad7c000ef279d1abf853b351b255284711674c0101292e423c4911c5331302e097c58f67c5247d21e6c61e194b846ae13b59e4b8d0a0feea25d224a777a06f847d213dcff6b588faa9daaea57d77ca75f3c54990890e73fffbba1af321b36eca277558d12222382f7eed891bc1b6288c55ab27df21ac6d04d034fe80d7a02a8afac61f6f436d3ef7dfa2f5bee4cf267c095ee9e53f7c8a50340f657da9a30bbfeb51ce9dead1c6d62fae0f79616b958d694d10dd641ed8ef9e578ef8d8be7ca4addee1d779644ad919b8389f450ffae3bd0fbbfda367f35f07c144280ab47c174954d7276305b583142bd9d68a0550a637a3f52decb6c42af3 public exponent: 10001 ] 2022-11-12 06:49:06.993 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:49:06.996 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:49:06.999 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-12 06:49:07.000 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:49:07.000 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-12 06:49:07.001 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:49:07.002 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:49:07.002 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:49:07.003 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:49:07.003 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:49:07.008 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:49:07.013 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:49:07.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:49:07.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:49:07.185 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:49:07.186 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:49:07.186 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:49:07.187 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:49:07.188 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:49:07.189 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:49:07.189 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:49:07.190 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:49:07.190 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:49:07.191 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:49:07.191 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:49:07.192 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:49:07.192 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:49:07.193 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:49:07.193 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:49:07.194 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:49:07.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:fd:46:ee:c6:e6:2b:37:d3:43:23:8c:91:54:53:bb:f9:8b:b2:5d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-12 06:49:23.855 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 06:49:23.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 06:49:23.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-12 06:49:23.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 06:49:23.862 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-12 06:49:23.863 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 06:49:23.863 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 06:49:23.864 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 06:49:23.865 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 06:49:23.866 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 06:49:23.874 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 06:49:23.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:49:23.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 06:49:23.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:49:24.012 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 06:49:24.013 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 06:49:24.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 06:49:24.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 06:49:24.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 06:49:24.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 06:49:24.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:49:24.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:49:24.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:49:24.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:49:24.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:49:24.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:49:24.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 06:49:24.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 06:49:24.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 06:49:24.026 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 06:49:24.032 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:1b:c0:6c:76:64:ee:f6:0a:f6:34:23:fd:ea:39:9f:16:4f:d6:20],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-12 07:12:43.200 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 07:12:43.204 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 07:12:43.207 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-12 07:12:43.208 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 07:12:43.208 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-12 07:12:43.209 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 07:12:43.210 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 07:12:43.210 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 07:12:43.210 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 07:12:43.211 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 07:12:43.216 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 07:12:43.217 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 07:12:43.217 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 07:12:43.218 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 07:12:43.390 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 07:12:43.391 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 07:12:43.391 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 07:12:43.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 07:12:43.393 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 07:12:43.393 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 07:12:43.394 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 07:12:43.394 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 07:12:43.394 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 07:12:43.395 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 07:12:43.395 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 07:12:43.396 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 07:12:43.412 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 07:12:43.412 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 07:12:43.412 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 07:12:43.413 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 07:12:43.417 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:fa:12:af:86:0b:22:f9:6c:6a:b7:d8:70:9d:17:3a:a7:ee:79:0d],[56:66:d1:a4] modulus: c39967238d1b7dd17291f03d3528afb1dd63c195437c278009a3026030f42a9caadc550d5a1b95fc2b6a38d77190945b643ba8e210d1c65127cb051416271f5cf5df893bf63e31b930bf3cdf004d5c3a79b3f7b110208060b484f1478599f82512cef6cba64ebb429ff7b8256f1efe6981d474217f1565975c21ab057bc2966a3412c23e00ad232790d1c60aac5678de2692cbc075d8733c31737a99849793787dd1e6eb85bb697b0c10ad5c9eed47997b71526a92f1ef84a46da484de50102dd45490c8a82b7da3afa0a1e613c6652511ad23ba8385a41ce37ee8a30d507220509784c6101a1706f0a305b463fa2b9beea2d36ea77b9a03cc9cbbb91b95f74d public exponent: 10001 ] 2022-11-12 07:12:50.407 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-12 07:12:50.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-12 07:12:50.409 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-12 07:12:50.410 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-12 07:12:50.410 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-12 07:12:50.411 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-12 07:12:50.411 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-12 07:12:50.412 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-12 07:12:50.412 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-12 07:12:50.413 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-12 07:12:50.416 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-12 07:12:50.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 07:12:50.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-12 07:12:50.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 07:12:50.526 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-12 07:12:50.526 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-12 07:12:50.527 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-12 07:12:50.527 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-12 07:12:50.528 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-12 07:12:50.528 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-12 07:12:50.529 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 07:12:50.529 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 07:12:50.529 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 07:12:50.530 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 07:12:50.530 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 07:12:50.530 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 07:12:50.531 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-12 07:12:50.531 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-12 07:12:50.531 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-12 07:12:50.532 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-12 07:12:50.534 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 665432390982186298299782860940689282063413649811 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 12 04:59:46 UTC 2022 Final Date: Thu Nov 11 04:59:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f 86fbcba0d303480c34ece797cb1c4137d2f52817 02f99871823111a148ed78e3e2a2e17698964c3d eed7d5759e0068eef1420268b58cf523e66cbe45 00f918b66d8278436aba0564d9310557469d13b5 967a73ada171a2a3ea01ee3249114e68f6b17936 baec494bf61a4f1cca7e6c431f50f2176041c7aa 4d9807f829990e76eb5bb921c20832557f1789bd 789294702782f4f9ac6ee685f3cb2a781b62e73f 1e6371b7a2b40600ede739de923a633a110c0bc0 c68e87f198ec80bf25169fb08480869e7796a471 09ce3829116b8301117868f780d1cda5302f699f 14ac820a80bb8f1266b06ab43d1880e35a1e4072 1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7 9430fb09d42f250e2c504ac0e8b24f41023e60bd 197c85adcc3ddc2feaa94d0abecf95b216a8288c 41831a67cba188e78b9d76bbe9d496ab92342e9f d732f6c929bec6ee8906e305dcca7c9af013b001 f03e29b3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:54:1a:e1:fc:fb:ec:e6:df:e7:65:c1:f7:75:99:eb:5d:f6:f0:c5],[56:66:d1:a4] modulus: ed04525693fb2870483b9e9866de5cf0cf91203abee673959a697856b17fde209b0b058fcfe8e17acf4223cb2a864816c3fc67e0519987a3ec6bad807c2d18c87c650c8c8496d55ce801fde4839fa20d8f7a77c5e19270e807998cee484afe4cf0396048a0127a08c565376adb4670f23a83a54f0177a59c9e12e05386ee0f8dd9a44baadcdfe15251cb77654f0a513ad0e7707b1b4a17d96f9503486e5eff7a6ffef3b8f82b63d36c4fc9906dd9633837e572f8645531cb9fb0efb69b10565ff694b25b20be555d283c97206792601af4dc99610d98986867d1072cba8819fe9434049596641c12961aaa1024e15872cd669aeb155380d53cbbf64dcc43aa8f public exponent: 10001 ]