By type
2022-11-13 05:02:59,896 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-13 05:03:00,980 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-13 05:03:01.639 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 13, 2022 5:03:03 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 13, 2022 5:03:03 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 13, 2022 5:03:03 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 13, 2022 5:03:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-13 05:03:04.263 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-13 05:03:04.503 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-13 05:03:04.662 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-13 05:03:05.445 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-13 05:03:05.449 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-13 05:03:05.451 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-13 05:03:05.454 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-13 05:03:05.503 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-13 05:03:05.509 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-13 05:03:05.605 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-13 05:03:06.370 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 13, 2022 5:03:07 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-13 05:03:07.365 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.329 seconds (JVM running for 10.127) Nov 13, 2022 5:03:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-13 05:04:03.422 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 05:04:03.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 05:04:03.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-13 05:04:03.460 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 05:04:03.476 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-13 05:04:03.480 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 05:04:03.482 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 05:04:03.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 05:04:03.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 05:04:03.488 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 05:04:03.496 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 05:04:03.500 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 05:04:03.546 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 05:04:03.553 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 05:04:03.554 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 05:04:03.558 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 05:04:04.178 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 05:04:04.181 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 05:04:04.182 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 05:04:04.183 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 05:04:04.194 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 05:04:04.196 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 05:04:04.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 05:04:04.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 05:04:04.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 05:04:04.210 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 05:04:04.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 05:04:04.212 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 05:04:04.216 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 05:04:04.217 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 05:04:04.217 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 05:04:04.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 05:04:04.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:96:b0:30:89:e9:68:03:d2:3e:26:b7:72:84:f9:66:29:26:d6:74],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:26:18.658 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:26:18.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:26:18.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 06:26:18.672 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:26:18.672 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 06:26:18.673 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:26:18.674 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:26:18.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:26:18.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:26:18.675 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:26:18.685 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:26:18.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:26:18.688 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:26:18.688 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:26:18.915 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:26:18.916 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:26:18.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:26:18.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:26:18.919 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:26:18.921 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:26:18.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:26:18.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:26:18.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:26:18.925 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:26:18.925 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:26:18.925 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:26:18.926 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:26:18.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:26:18.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:26:18.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:26:18.931 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:7c:5a:a1:d9:08:1f:d5:f7:72:8f:59:63:a9:c5:77:f0:5d:dd:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:28:06.627 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:28:06.628 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:28:06.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-13 06:28:06.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:28:06.632 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-13 06:28:06.633 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:28:06.633 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:28:06.633 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:28:06.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:28:06.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:28:06.640 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:28:06.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:28:06.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:28:06.642 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:28:06.954 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:28:06.955 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:28:06.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:28:06.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:28:06.958 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:28:06.959 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:28:06.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:28:06.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:28:06.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:28:06.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:28:06.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:28:06.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:28:06.962 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:28:06.962 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:28:06.963 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:28:06.964 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:28:06.969 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: b059681abb9960e87b7ac0d0ea7320e1466a2422b5df045d829351136f888caa3aa8e9f587cc1bdf8eaace3ee4628f3c881c0a368e46ded52d842a1036b96de82aec602975672456378312a7b205da1bea46b9080b9958ffdac8c4cc408cc45fba1c36fbe0f4d2e9bfa026e33f6adaac9a121b4f67b404cb295eaf47b0491fead7217e549b64b0c433f64d89bddc0f67b0e4e4119fc1156f1e55ffa61dafdb6f9a6333c15398c9fcae7b3eb3360712a7fca2967b26cb7848e625c487fffdf40636b0e622d3db54ae5d27ff85910ee6f151d6880c0ab6fe3d9ba44be46fb2558c043f9cbb1762305084112be816e158a194ff2e263e0c483ecee33ce995c45816f8bd7ddb4fe4b28aa1060dd5044fbd0a4ed20cfeda894f65454f6969262e25a10f5d7d6a09230ef6cb97968d7bfc6377f74dfb883e8c75a389e816ae6a2af0704fc4490b38fad3569982fcc3631c3bc72dae11f03529e7d0c7bb5d44f359e414f59a6308719acb482c7597d35a812eceb476912846d8f51788fcba0cbbcf78b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:df:06:46:9d:2d:8f:b9:81:f6:f2:ea:8e:42:fb:f7:06:2e:ad:c7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:29:30.915 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:29:30.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:29:30.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-13 06:29:30.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:29:30.922 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-13 06:29:30.923 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:29:30.923 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:29:30.923 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:29:30.924 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:29:30.924 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:29:30.933 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:29:30.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:29:30.935 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:29:30.935 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:29:31.126 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:29:31.126 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:29:31.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:29:31.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:29:31.129 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:29:31.130 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:29:31.131 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:29:31.131 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:29:31.131 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:29:31.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:29:31.132 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:29:31.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:29:31.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:29:31.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:29:31.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:29:31.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:29:31.142 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:f9:8f:d2:4b:b0:f8:39:5e:21:f0:67:77:28:00:a4:45:c7:98:62],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:31:48.343 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:31:48.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:31:48.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 06:31:48.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:31:48.348 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-13 06:31:48.349 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:31:48.350 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:31:48.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:31:48.350 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:31:48.352 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:31:48.357 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:31:48.358 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:31:48.358 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:31:48.358 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:31:48.539 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:31:48.541 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:31:48.541 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:31:48.541 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:31:48.543 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:31:48.543 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:31:48.543 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:31:48.544 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:31:48.544 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:31:48.545 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:31:48.545 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:31:48.545 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:31:48.546 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:31:48.546 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:31:48.547 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:31:48.547 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:31:48.550 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d9:7b:c8:02:ed:66:1d:32:2e:78:2a:32:1f:e4:02:f8:b7:a4:91:2f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:40:11.679 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:40:11.681 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:40:11.683 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-13 06:40:11.684 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:40:11.685 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-13 06:40:11.685 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:40:11.686 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:40:11.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:40:11.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:40:11.687 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:40:11.693 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:40:11.696 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:40:11.696 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:40:11.697 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:40:11.929 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:40:11.930 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:40:11.930 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:40:11.931 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:40:11.932 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:40:11.932 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:40:11.932 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:40:11.933 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:40:11.933 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:40:11.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:40:11.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:40:11.934 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:40:11.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:40:11.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:40:11.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:40:11.935 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:40:11.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: b059681abb9960e87b7ac0d0ea7320e1466a2422b5df045d829351136f888caa3aa8e9f587cc1bdf8eaace3ee4628f3c881c0a368e46ded52d842a1036b96de82aec602975672456378312a7b205da1bea46b9080b9958ffdac8c4cc408cc45fba1c36fbe0f4d2e9bfa026e33f6adaac9a121b4f67b404cb295eaf47b0491fead7217e549b64b0c433f64d89bddc0f67b0e4e4119fc1156f1e55ffa61dafdb6f9a6333c15398c9fcae7b3eb3360712a7fca2967b26cb7848e625c487fffdf40636b0e622d3db54ae5d27ff85910ee6f151d6880c0ab6fe3d9ba44be46fb2558c043f9cbb1762305084112be816e158a194ff2e263e0c483ecee33ce995c45816f8bd7ddb4fe4b28aa1060dd5044fbd0a4ed20cfeda894f65454f6969262e25a10f5d7d6a09230ef6cb97968d7bfc6377f74dfb883e8c75a389e816ae6a2af0704fc4490b38fad3569982fcc3631c3bc72dae11f03529e7d0c7bb5d44f359e414f59a6308719acb482c7597d35a812eceb476912846d8f51788fcba0cbbcf78b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:42:7a:f3:71:1d:1b:5c:ea:5b:9a:89:52:5d:d5:af:26:f0:86:5f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:45:56.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:45:56.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:45:56.327 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-13 06:45:56.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:45:56.331 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-13 06:45:56.333 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:45:56.333 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:45:56.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:45:56.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:45:56.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:45:56.339 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:45:56.340 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:45:56.341 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:45:56.341 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:45:56.578 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:45:56.579 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:45:56.580 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:45:56.580 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:45:56.582 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:45:56.583 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:45:56.584 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:45:56.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:45:56.585 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:45:56.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:45:56.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:45:56.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:45:56.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:45:56.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:45:56.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:45:56.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:45:56.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:be:8c:45:f5:07:7a:fa:ec:0c:8f:1e:e9:2b:a5:87:a7:dd:e5:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 06:46:15.569 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 06:46:15.570 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 06:46:15.571 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-13 06:46:15.572 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 06:46:15.572 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-13 06:46:15.573 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 06:46:15.573 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 06:46:15.573 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 06:46:15.573 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 06:46:15.573 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 06:46:15.575 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 06:46:15.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:46:15.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 06:46:15.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:46:15.761 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 06:46:15.762 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 06:46:15.762 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 06:46:15.763 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 06:46:15.764 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 06:46:15.764 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 06:46:15.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:46:15.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:46:15.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:46:15.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:46:15.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:46:15.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:46:15.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 06:46:15.766 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 06:46:15.767 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 06:46:15.767 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 06:46:15.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:98:db:82:bd:b9:91:cc:80:93:25:ba:34:a4:9e:ea:fb:eb:04:7d],[56:66:d1:a4] modulus: ce47b76f311b5c900f3b35076cd6f0d05a58bdccb09ebb161b224e959586e9c40dda7fc9d9bde724996f40dd176d2b3f7914a81af4289804cbb2108a9f0137183da9a49e3eb065139c181821d1589ad2fc440c665fbfc20cb084f283452de10978e85cec70c1a4872966121de5117dc95fce715b33b0447f67f0f23041ee8402899c8dc541e9d961f8039a1dfea00273b34bd8ab6000a7665371573207ec65afca943cbe285dad7d07f6d0d7e8d88160d3da56bb6e2295baa4e43769c59319e6507685ac322f858c48449b064767c096c58ebf88eb1f7d8f161043f7de0d77d230212019483ab173c1f510be70460fee3ec22770076eb417eee5a04b73a474e7 public exponent: 10001 ] 2022-11-13 07:10:25.045 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 07:10:25.047 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 07:10:25.049 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-13 07:10:25.051 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 07:10:25.051 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-13 07:10:25.051 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 07:10:25.052 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 07:10:25.052 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 07:10:25.052 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 07:10:25.053 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 07:10:25.057 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 07:10:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 07:10:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 07:10:25.058 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 07:10:25.267 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 07:10:25.268 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 07:10:25.268 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 07:10:25.268 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 07:10:25.269 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 07:10:25.270 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 07:10:25.271 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 07:10:25.271 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 07:10:25.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 07:10:25.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 07:10:25.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 07:10:25.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 07:10:25.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 07:10:25.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 07:10:25.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 07:10:25.274 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 07:10:25.277 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:f4:80:74:e6:16:d4:a0:9d:f6:f4:29:20:3b:70:5b:95:ad:d4:0e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-13 07:10:31.795 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-13 07:10:31.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-13 07:10:31.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-13 07:10:31.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-13 07:10:31.798 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-13 07:10:31.799 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-13 07:10:31.799 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-13 07:10:31.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-13 07:10:31.800 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-13 07:10:31.800 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-13 07:10:31.803 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-13 07:10:31.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 07:10:31.805 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-13 07:10:31.805 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 07:10:31.962 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-13 07:10:31.962 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-13 07:10:31.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-13 07:10:31.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-13 07:10:31.964 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-13 07:10:31.964 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-13 07:10:31.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 07:10:31.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 07:10:31.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 07:10:31.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 07:10:31.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 07:10:31.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 07:10:31.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-13 07:10:31.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-13 07:10:31.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-13 07:10:31.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-13 07:10:31.968 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 538556996655796121079551713408308382294188709306 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 13 04:59:47 UTC 2022 Final Date: Fri Nov 12 04:59:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba 54472996883570a7ccf70d01b01e432408ee6e79 2ba16417ccc21ec2f8c1c01bef8f1ec130333604 e32c6bde13a4755bfc2084689a64e26b57c2d44a 9e5af927637c4f60c7a827916acccbffb36df212 72ca61b7658ad8c141fa03986cd043d1938109c3 3e3871f2ecc7ac1c0f47304291a0f235d3b6b674 98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9 19ece431baf9a8420a5aa8b59057cb994072c54c dfd1ffee770f4685dcbf6a824a0060adb77ddfa1 205a596cdc2523fe01e537e265345339fe68b427 f18d59916395511e960d37d11c373402e4f4c2e9 836f2354aeb918a8806e973aca841f7170947fc6 7452e4d59a4de98b15e170b0132cd294966b1fd5 4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c fb4c1d05f1c845f0e9dd9795480f85317f5cc28e c08b86ea95243198d484ceda85d3dfbf60e1755c af2b74df09e9be36b481097f8ad7f0e3d9402345 53eb3f71762a0e4607ceec42265c34e8cc686f93 4fd4dbf9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:5e:b8:20:24:4a:8e:48:44:ac:2d:fb:3c:53:2c:49:8a:34:bd:50],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]