By type
2022-06-07 02:04:20,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-07 02:04:23,688 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-07 02:04:26.393 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 07, 2022 2:04:34 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 07, 2022 2:04:34 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 07, 2022 2:04:34 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 07, 2022 2:04:34 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-07 02:04:36.575 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-07 02:04:37.589 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-07 02:04:38.185 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-07 02:04:40.976 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-07 02:04:40.980 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-07 02:04:40.981 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-07 02:04:40.985 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-07 02:04:41.100 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-07 02:04:41.179 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-07 02:04:41.600 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-07 02:04:45.386 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 07, 2022 2:04:47 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-07 02:04:48.987 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 31.304 seconds (JVM running for 37.608) Jun 07, 2022 2:04:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-07 02:05:21.082 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 02:05:21.089 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 02:05:21.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 02:05:21.205 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 02:05:21.289 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-07 02:05:21.292 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 02:05:21.293 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 02:05:21.294 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 02:05:21.294 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 02:05:21.376 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 02:05:21.382 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 02:05:21.385 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 02:05:21.577 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 02:05:21.581 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 02:05:21.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 02:05:21.585 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 02:05:22.777 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 02:05:22.780 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 02:05:22.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 02:05:22.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 02:05:22.790 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 02:05:22.791 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 02:05:22.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 02:05:22.792 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 02:05:22.792 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 02:05:22.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 02:05:22.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 02:05:22.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 02:05:22.892 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 02:05:22.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 02:05:22.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 02:05:22.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 02:05:23.000 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:ad:ae:82:d8:9e:38:0d:b1:b3:d3:c1:49:39:1f:94:f1:ac:37:76] modulus: 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 public exponent: 10001 ] 2022-06-07 03:33:30.667 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 03:33:30.669 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 03:33:30.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 03:33:30.671 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 03:33:30.672 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 03:33:30.673 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 03:33:30.673 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 03:33:30.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 03:33:30.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 03:33:30.676 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 03:33:30.683 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 03:33:30.683 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:33:30.684 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:33:30.684 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:33:30.804 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 03:33:30.805 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 03:33:30.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 03:33:30.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:33:30.808 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 03:33:30.808 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 03:33:30.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:33:30.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:33:30.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:33:30.810 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:33:30.811 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:33:30.811 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:33:30.812 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:33:30.812 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:33:30.812 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:33:30.814 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 03:33:30.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:1e:47:26:ba:8e:43:fc:42:9c:df:c1:c4:06:62:d0:54:ec:50:9a] modulus: c8636e2d71f6bf7fbd89684c22347b38c01766509e6c0e6fdbd38756abaeef31001d9bbfebb036d33eb1fd27b50b8b4b5f4f989b48d97d4d425916c12436c19eedc8347febc234788af40a5e5d308898769283b28cbcc3cf9f27ec06c65f332ad33caac1a71a361139f76601dccdbfa969cb0f09e84bd728a8fbb609f4f3f860ea3d56ef6f9cde0b80502c70bccb82ac802b0b7846edd028ddecd3d60ea994c646f426e5bcbd33e13d96f724f11926de47ec70a609dd6c4d900e62aabeaad2fd8a839bde139d64074f5f977171b425e30126995d39461a2c77e0bc5857613e07e82c561c01ba152a33e0e14757dbda1b8bc6b8832fdb09ee7efaed06622fb36d public exponent: 10001 ] 2022-06-07 03:37:21.276 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 03:37:21.277 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 03:37:21.278 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 03:37:21.279 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 03:37:21.279 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 03:37:21.280 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 03:37:21.280 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 03:37:21.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 03:37:21.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 03:37:21.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 03:37:21.290 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 03:37:21.291 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:37:21.291 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:37:21.291 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:37:21.479 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 03:37:21.479 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 03:37:21.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 03:37:21.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:37:21.482 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 03:37:21.482 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 03:37:21.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:37:21.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:37:21.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:37:21.487 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:37:21.487 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:37:21.487 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:37:21.488 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:37:21.488 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:37:21.488 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:37:21.489 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 03:37:21.492 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:4a:ec:12:58:0a:67:34:23:e1:a2:9a:25:e0:83:a2:8a:4b:ae:03] modulus: c2551b35f61c64cf55e21e5d7b551b0b2febbe4e705f6a757388885f728038d9dc6d40642922df2cb8d40b8206bce315e8e6a96dfbd1d895741d0c7b03c6ade2449f40967c69cb6ea7b00325fc2d6d16ab281137d9ab65cf1100823be657bd3830f0d7f674d9a8ed5d47d3ae1a0c5d9225f8bacbc377d18ddca4b85942de4a6de5207cd68cce67416c93c7915025e354a190c9bcea2abc09d31fb296e39a1586c3efd49a248e6f1d0956ed2a8e055afc049d044e4e602080e37ce1869ba1b7e78a4b91fc63f569e7b1d5b1401e0817d2ce952c0095ea20e8c017c3a952e38cdb441a1871cf37f7b762309b175c1682404a920ba891a0e8a0ec381f8c363599ff public exponent: 10001 ] 2022-06-07 03:39:47.871 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 03:39:47.873 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 03:39:47.874 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 03:39:47.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 03:39:47.875 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-07 03:39:47.876 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 03:39:47.876 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 03:39:47.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 03:39:47.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 03:39:47.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 03:39:47.882 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 03:39:47.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:39:47.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:39:47.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:39:48.222 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 03:39:48.223 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 03:39:48.223 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 03:39:48.224 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:39:48.225 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 03:39:48.226 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 03:39:48.226 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:39:48.226 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:39:48.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:39:48.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:39:48.228 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:39:48.228 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:39:48.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:39:48.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:39:48.230 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:39:48.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 03:39:48.233 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:48:c7:09:44:ce:8f:26:e5:d7:29:eb:46:0a:4a:de:7e:46:1e:97] modulus: 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 public exponent: 10001 ] 2022-06-07 03:41:22.818 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 03:41:22.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 03:41:22.820 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 03:41:22.821 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 03:41:22.821 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-07 03:41:22.822 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 03:41:22.822 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 03:41:22.822 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 03:41:22.823 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 03:41:22.823 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 03:41:22.827 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 03:41:22.828 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:41:22.828 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:41:22.829 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:41:22.974 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 03:41:22.975 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 03:41:22.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 03:41:22.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:41:22.977 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 03:41:22.978 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 03:41:22.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:41:22.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:41:22.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:41:22.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:41:22.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:41:22.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:41:22.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:41:22.982 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:41:22.982 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:41:22.983 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 03:41:22.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:a4:64:b3:58:0a:9d:71:b9:b9:4a:5d:95:92:a2:6a:c7:f9:79:f3] modulus: 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 public exponent: 10001 ] 2022-06-07 03:45:26.827 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 03:45:26.829 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 03:45:26.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 03:45:26.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 03:45:26.831 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-07 03:45:26.831 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 03:45:26.832 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 03:45:26.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 03:45:26.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 03:45:26.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 03:45:26.838 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 03:45:26.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:45:26.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:45:26.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:45:26.927 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 03:45:26.928 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 03:45:26.928 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 03:45:26.928 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:45:26.930 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 03:45:26.930 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 03:45:26.930 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:45:26.931 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:45:26.931 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:45:26.932 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:45:26.932 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:45:26.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:45:26.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:45:26.934 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:45:26.934 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:45:26.935 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 03:45:26.937 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:6d:f8:e8:82:b1:90:50:42:9f:92:30:19:84:d3:f8:83:1e:45:f9] modulus: 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 public exponent: 10001 ] 2022-06-07 03:52:25.697 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 03:52:25.698 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 03:52:25.700 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 03:52:25.700 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 03:52:25.700 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-07 03:52:25.701 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 03:52:25.701 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 03:52:25.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 03:52:25.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 03:52:25.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 03:52:25.707 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 03:52:25.707 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:52:25.707 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 03:52:25.708 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:52:25.793 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 03:52:25.793 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 03:52:25.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 03:52:25.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 03:52:25.795 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 03:52:25.795 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 03:52:25.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:52:25.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:52:25.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:52:25.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:52:25.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:52:25.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:52:25.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 03:52:25.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 03:52:25.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 03:52:25.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 03:52:25.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:79:f9:2d:f4:33:a4:4f:f7:20:49:24:51:28:da:5b:0d:7b:14:f9] modulus: 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 public exponent: 10001 ] 2022-06-07 04:02:24.016 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 04:02:24.017 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 04:02:24.018 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 04:02:24.019 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 04:02:24.019 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-07 04:02:24.019 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 04:02:24.019 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 04:02:24.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 04:02:24.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 04:02:24.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 04:02:24.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 04:02:24.025 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 04:02:24.027 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 04:02:24.027 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 04:02:24.208 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 04:02:24.209 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 04:02:24.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 04:02:24.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 04:02:24.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 04:02:24.210 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 04:02:24.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 04:02:24.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 04:02:24.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 04:02:24.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 04:02:24.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 04:02:24.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 04:02:24.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 04:02:24.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 04:02:24.213 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 04:02:24.213 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 04:02:24.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:07:44:48:06:11:98:88:3a:0c:eb:8d:01:34:51:fa:6b:48:c2:65] modulus: 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 public exponent: 10001 ] 2022-06-07 04:03:34.169 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-07 04:03:34.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-07 04:03:34.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 04:03:34.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-07 04:03:34.173 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-07 04:03:34.173 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-07 04:03:34.174 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-07 04:03:34.174 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-07 04:03:34.174 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-07 04:03:34.174 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-07 04:03:34.179 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-07 04:03:34.179 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 04:03:34.179 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-07 04:03:34.180 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 04:03:34.269 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-07 04:03:34.269 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-07 04:03:34.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-07 04:03:34.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-07 04:03:34.271 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-07 04:03:34.271 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-07 04:03:34.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 04:03:34.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 04:03:34.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 04:03:34.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 04:03:34.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 04:03:34.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 04:03:34.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-07 04:03:34.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-07 04:03:34.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-07 04:03:34.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-07 04:03:34.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 521423419128688653756624289027813751911183231529 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 07 02:01:20 UTC 2022 Final Date: Sun Jun 06 02:01:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4 8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb 174baf7c6b46ba09131cc7a83c3ddefda2b91388 b4f938ba2e88310354a4d2da9bdc7c714eba29cd 4a6de5610ee229c986ce8bfba365ec553fbc1164 8649cca1193b395ec9c32a638b16ddcd02bd185f bcba2b70ec64b696181304065d46b8267bd3120b c3cb155c0b2628900f8ab045db37d1da4e2b3bc4 d6ba3229ffee04a275c22490d0c24eebfea4a0f3 d074dcc93ea98a31972ecb510e05aefea1de5d48 ac2cb07c4614c6384c5fc6a541382d542935930b 75e0289dd8dedee5c66e5751b932c561cd9fe415 d85da99d1f780e119f6ed5b22e3f041d7af413af 71efe028f3bd36806acd47bb570fcf4fadfe8a67 e6aca992418585c405ed7ed11c53ff525a2d5c4d 3355108e2474ea89fa527d1e6fb865a1021714bd a738bb7e5800b461680f56a02a989cff061f4023 07a71587ae39288299eefaf7c34230c98ac7765d 602da382068ba998665e0ee28e687999c2680cf2 342edeb5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:9f:ee:c3:51:36:05:99:cb:82:05:1d:f8:0f:16:dd:7b:ce:22:d1] modulus: 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 public exponent: 10001 ]