By type
2022-11-15 04:59:34,308 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-15 04:59:35,547 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-15 04:59:36.312 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 15, 2022 4:59:38 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 15, 2022 4:59:38 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 15, 2022 4:59:38 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 15, 2022 4:59:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-15 04:59:39.079 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-15 04:59:39.400 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-15 04:59:39.567 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-15 04:59:40.467 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-15 04:59:40.471 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-15 04:59:40.472 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-15 04:59:40.476 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-15 04:59:40.520 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-11-15 04:59:40.528 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-15 04:59:40.673 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-15 04:59:41.659 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 15, 2022 4:59:42 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-15 04:59:42.769 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.699 seconds (JVM running for 11.95) Nov 15, 2022 5:00:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-15 05:00:22.693 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 05:00:22.705 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 05:00:22.750 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-15 05:00:22.754 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 05:00:22.770 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-15 05:00:22.773 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 05:00:22.774 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 05:00:22.775 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 05:00:22.775 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 05:00:22.779 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 05:00:22.787 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 05:00:22.790 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 05:00:22.858 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 05:00:22.864 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 05:00:22.865 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 05:00:22.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 05:00:23.509 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 05:00:23.511 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 05:00:23.511 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 05:00:23.514 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 05:00:23.535 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 05:00:23.539 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 05:00:23.540 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 05:00:23.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 05:00:23.542 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 05:00:23.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 05:00:23.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 05:00:23.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 05:00:23.576 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 05:00:23.577 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 05:00:23.577 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 05:00:23.579 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 05:00:23.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: b37ba55044791bf889b15fd98d37ac470ad4746ff7452e566b06ae1e5e63092503909fb657a7260d6e7cb04c73c284bb3ab9724a6df688a891cadbb08906220c93f0a8410489a28ffe85298752b40be6f234b198827f21aaf9b365587e23275ffd902f7b3250c6c357d9f3825e25f4b7bae00bc3cd12d1a7e94aed8821941274d2ca74c3125da409991a139fde0c1d3c41a8d72285c42de85ed645ae2510556376ac40cec714514c98e8ecde00dc67fc3dfafea6dc1f15bd77e56c1ac7db9a8e00b7abb96243cae023d835bf1ab28fdcca9a294fb719c9f3ae73094177381eca1a5ae4bed48200e8f8742f9f3548679f3a0967320033946ac628a17274df4f98e86d4ccafa741a37836068aa6213f810d5d381a1699aa6212d0f74c44c6bf58b0d63c0c4ccee7d24eeeca13547056af5cd1f9b6a7de1a813476794815b555617f60adee41390ad9585f27f0577a9107e38d604927a922a781be1f8744b3b0b09785f47548e1f5341d595dce2c4f566aee48fc220daa929f45b9209098cf4a021 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:b1:97:35:48:89:ed:02:1e:36:65:40:aa:71:c9:bf:6c:fa:d5:1b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 06:19:59.247 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:19:59.251 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:19:59.255 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 06:19:59.257 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:19:59.258 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 06:19:59.260 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:19:59.260 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:19:59.261 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:19:59.262 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:19:59.263 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:19:59.269 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:19:59.272 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:19:59.273 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:19:59.274 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:19:59.500 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:19:59.501 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:19:59.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:19:59.503 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:19:59.508 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:19:59.509 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:19:59.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:19:59.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:19:59.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:19:59.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:19:59.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:19:59.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:19:59.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:19:59.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:19:59.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:19:59.519 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:19:59.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:49:05:82:80:f3:52:07:8b:91:dd:42:e8:ae:94:0d:69:74:9c:a5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 06:21:47.210 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:21:47.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:21:47.214 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-15 06:21:47.216 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:21:47.217 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-15 06:21:47.218 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:21:47.218 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:21:47.219 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:21:47.219 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:21:47.220 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:21:47.225 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:21:47.226 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:21:47.226 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:21:47.226 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:21:47.394 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:21:47.395 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:21:47.395 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:21:47.396 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:21:47.399 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:21:47.400 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:21:47.400 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:21:47.401 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:21:47.401 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:21:47.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:21:47.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:21:47.403 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:21:47.403 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:21:47.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:21:47.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:21:47.406 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:21:47.409 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:eb:bb:cf:06:93:86:29:28:02:bd:41:0e:c2:04:e4:ff:a4:7d:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 06:23:25.569 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:23:25.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:23:25.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-15 06:23:25.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:23:25.579 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-15 06:23:25.580 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:23:25.580 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:23:25.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:23:25.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:23:25.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:23:25.585 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:23:25.586 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:23:25.586 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:23:25.586 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:23:25.744 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:23:25.745 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:23:25.745 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:23:25.746 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:23:25.753 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:23:25.761 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:23:25.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:23:25.762 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:23:25.762 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:23:25.763 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:23:25.763 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:23:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:23:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:23:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:23:25.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:23:25.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:23:25.785 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:5f:8f:8e:f6:61:7a:27:a8:90:b0:06:53:ea:fe:0d:20:41:54:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 06:26:27.211 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:26:27.213 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:26:27.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 06:26:27.216 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:26:27.217 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 06:26:27.217 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:26:27.218 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:26:27.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:26:27.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:26:27.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:26:27.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:26:27.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:26:27.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:26:27.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:26:27.372 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:26:27.373 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:26:27.373 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:26:27.373 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:26:27.375 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:26:27.375 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:26:27.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:26:27.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:26:27.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:26:27.377 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:26:27.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:26:27.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:26:27.379 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:26:27.379 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:26:27.379 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:26:27.380 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:26:27.383 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:4c:a2:33:8a:bf:1e:6d:b7:2a:7a:83:df:d2:19:a3:6e:ab:b2:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 06:32:55.282 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:32:55.284 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:32:55.287 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-15 06:32:55.287 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:32:55.288 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-15 06:32:55.289 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:32:55.289 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:32:55.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:32:55.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:32:55.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:32:55.295 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:32:55.296 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:32:55.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:32:55.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:32:55.479 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:32:55.494 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:32:55.495 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:32:55.495 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:32:55.497 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:32:55.497 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:32:55.498 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:32:55.499 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:32:55.499 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:32:55.500 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:32:55.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:32:55.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:32:55.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:32:55.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:32:55.503 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:32:55.504 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:32:55.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: b37ba55044791bf889b15fd98d37ac470ad4746ff7452e566b06ae1e5e63092503909fb657a7260d6e7cb04c73c284bb3ab9724a6df688a891cadbb08906220c93f0a8410489a28ffe85298752b40be6f234b198827f21aaf9b365587e23275ffd902f7b3250c6c357d9f3825e25f4b7bae00bc3cd12d1a7e94aed8821941274d2ca74c3125da409991a139fde0c1d3c41a8d72285c42de85ed645ae2510556376ac40cec714514c98e8ecde00dc67fc3dfafea6dc1f15bd77e56c1ac7db9a8e00b7abb96243cae023d835bf1ab28fdcca9a294fb719c9f3ae73094177381eca1a5ae4bed48200e8f8742f9f3548679f3a0967320033946ac628a17274df4f98e86d4ccafa741a37836068aa6213f810d5d381a1699aa6212d0f74c44c6bf58b0d63c0c4ccee7d24eeeca13547056af5cd1f9b6a7de1a813476794815b555617f60adee41390ad9585f27f0577a9107e38d604927a922a781be1f8744b3b0b09785f47548e1f5341d595dce2c4f566aee48fc220daa929f45b9209098cf4a021 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:58:da:e1:2a:bc:e4:c2:d5:cb:c1:9d:2d:35:50:ff:9a:c0:49:7c],[56:66:d1:a4] modulus: deb5196cbea2b501e1176cc66770b96f11dffd300c1a8748054d1e24dfe85d69b5068140692d946171ba3b69502bb5f3c6dc266ba5a96428ace950da87230cfc3994c10f2b7475474cc0c7d12807991d2d481cf6aca5dcb5c710d0b797a7628e1bb032597f6b4119bac59c6cf607d02d2c7377ce3e2bca4b9a95b145a586c621145137a8ff8a103d04754854a793056f153c2cdd0acca192541033ea9ac1c8af2dd32bbe33dbc49b5fc8d78212c4cd6f9c0e41463fe59c4887c00eee2882601c2b52e16b7fb67bed1dad76b2de1dce76a1487487d4c1b076b8a6bc3d3dbcc7bac5f02e416f485bb007e4099f5ba6fad1a8f52d14931a01291821a33942f7b577 public exponent: 10001 ] 2022-11-15 06:39:03.768 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:39:03.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:39:03.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-15 06:39:03.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:39:03.776 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-15 06:39:03.776 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:39:03.777 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:39:03.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:39:03.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:39:03.778 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:39:03.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:39:03.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:39:03.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:39:03.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:39:03.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:39:03.971 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:39:03.971 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:39:03.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:39:03.973 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:39:03.974 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:39:03.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:39:03.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:39:03.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:39:03.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:39:03.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:39:03.977 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:39:03.978 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:39:03.978 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:39:03.978 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:39:03.979 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:39:03.983 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:95:7a:ef:43:07:bf:41:7e:0a:89:0d:9c:c6:bc:80:60:98:2b:d4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 06:39:24.654 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 06:39:24.655 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 06:39:24.657 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-15 06:39:24.658 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 06:39:24.658 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-15 06:39:24.658 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 06:39:24.659 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 06:39:24.659 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 06:39:24.659 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 06:39:24.660 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 06:39:24.663 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 06:39:24.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:39:24.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 06:39:24.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:39:24.795 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 06:39:24.796 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 06:39:24.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 06:39:24.797 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 06:39:24.798 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 06:39:24.799 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 06:39:24.799 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:39:24.799 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:39:24.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:39:24.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:39:24.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:39:24.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:39:24.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 06:39:24.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 06:39:24.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 06:39:24.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 06:39:24.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:de:3f:03:37:98:2b:c3:eb:df:bd:51:57:57:23:5a:de:83:d7:25],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 07:03:32.153 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 07:03:32.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 07:03:32.159 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-15 07:03:32.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 07:03:32.160 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-15 07:03:32.161 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 07:03:32.161 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 07:03:32.161 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 07:03:32.162 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 07:03:32.162 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 07:03:32.166 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 07:03:32.167 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 07:03:32.167 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 07:03:32.167 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 07:03:32.338 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 07:03:32.339 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 07:03:32.339 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 07:03:32.340 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 07:03:32.342 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 07:03:32.342 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 07:03:32.342 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 07:03:32.343 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 07:03:32.343 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 07:03:32.344 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 07:03:32.344 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 07:03:32.344 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 07:03:32.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 07:03:32.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 07:03:32.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 07:03:32.346 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 07:03:32.350 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:2c:4c:bd:0d:8b:c3:ab:cc:49:be:23:12:f0:8d:42:0c:d3:cd:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-15 07:03:39.013 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 07:03:39.016 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 07:03:39.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-15 07:03:39.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 07:03:39.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-15 07:03:39.019 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 07:03:39.019 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 07:03:39.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 07:03:39.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 07:03:39.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 07:03:39.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 07:03:39.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 07:03:39.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 07:03:39.030 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 07:03:39.194 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 07:03:39.195 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 07:03:39.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 07:03:39.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 07:03:39.201 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 07:03:39.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 07:03:39.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 07:03:39.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 07:03:39.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 07:03:39.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 07:03:39.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 07:03:39.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 07:03:39.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 07:03:39.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 07:03:39.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 07:03:39.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 07:03:39.212 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 447905603412452406015049344733110659143014204099 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 04:56:15 UTC 2022 Final Date: Sun Nov 14 04:56:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 71e8cf45241016b11c1a807bd5e871651a687a59 7959f3c8dc73ee5cf93630c62a9178d6caba2c76 81cf8b7f4a202cbe8f4791afe388461cdef64665 7b771ed77f336470f5edc5941a8f203a06161bce 8841d7630200ce83325cf4e5a1685dc60c944254 d7737cf9122ac15cefd633709e5c445c888a5c3b a9d0bd949e115d215481c0e3e5578247453e6572 6586ea21fee55891a94f825846568a6e620cd1ce 9bf557e4cdd087c0d4482ec867db08ce2e7e8492 cb1fc5023556fd7fbbebdb45fd6cfd5373240fec 27485e4b16861a196c02d845f932d94cc5d42b86 c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583 806065b08876736bdb8756daa1525c6b1c9c6a32 bc67601846be5180ef18c89e3a56ffa8e89d4081 cd44aa75e771f5b5ab14de5d175a97e2bf0f760e 164dc892aba52aa7ae84da25037ee4be157f9fb0 e778dad90822932566df7b53cd35ef17241dd5a3 ffa1790af4d8dbf3731ff5b58a8601e496620617 3acc4d48459dff74456cd63075ea38a48fdc13f9 778b6440 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:48:28:cd:fd:4a:f0:14:dd:e7:dc:10:c9:47:cc:55:b0:d8:d2:d4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]