By type
2022-11-18 17:09:20,742 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-18 17:09:22,231 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-18 17:09:23.018 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 18, 2022 5:09:25 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 18, 2022 5:09:25 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 18, 2022 5:09:25 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 18, 2022 5:09:25 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-18 17:09:25.723 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-18 17:09:26.019 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-18 17:09:26.224 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-18 17:09:26.912 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-18 17:09:26.914 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-18 17:09:26.915 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-18 17:09:26.919 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-18 17:09:26.956 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-18 17:09:26.960 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-18 17:09:27.077 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-18 17:09:27.645 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 18, 2022 5:09:28 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-18 17:09:28.601 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.835 seconds (JVM running for 10.828) Nov 18, 2022 5:09:48 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-18 17:10:14.391 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 17:10:14.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 17:10:14.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-18 17:10:14.453 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 17:10:14.472 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-18 17:10:14.474 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 17:10:14.475 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 17:10:14.476 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 17:10:14.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 17:10:14.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 17:10:14.488 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 17:10:14.492 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 17:10:14.546 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 17:10:14.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 17:10:14.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 17:10:14.558 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 17:10:15.335 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 17:10:15.338 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 17:10:15.339 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 17:10:15.341 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 17:10:15.350 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 17:10:15.351 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 17:10:15.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 17:10:15.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 17:10:15.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 17:10:15.368 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 17:10:15.369 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 17:10:15.369 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 17:10:15.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 17:10:15.376 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 17:10:15.377 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 17:10:15.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 17:10:15.411 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:a1:4c:54:fc:f9:69:e0:63:fe:80:31:33:85:39:e2:ab:f4:d7:e4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:09:05.483 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:09:05.487 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:09:05.491 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 20:09:05.494 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:09:05.495 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 20:09:05.498 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:09:05.499 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:09:05.499 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:09:05.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:09:05.503 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:09:05.508 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:09:05.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:09:05.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:09:05.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:09:05.730 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:09:05.731 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:09:05.731 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:09:05.731 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:09:05.734 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:09:05.734 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:09:05.736 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:09:05.737 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:09:05.737 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:09:05.741 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:09:05.742 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:09:05.742 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:09:05.743 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:09:05.743 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:09:05.743 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:09:05.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:09:05.749 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:8c:ef:4c:eb:48:00:68:ee:e5:a0:cc:e2:2d:ee:9b:7b:a8:17:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:11:03.850 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:11:03.854 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:11:03.857 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-18 20:11:03.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:11:03.859 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-18 20:11:03.860 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:11:03.861 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:11:03.861 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:11:03.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:11:03.863 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:11:03.868 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:11:03.869 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:11:03.870 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:11:03.870 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:11:04.012 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:11:04.013 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:11:04.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:11:04.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:11:04.017 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:11:04.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:11:04.019 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:11:04.019 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:11:04.020 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:11:04.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:11:04.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:11:04.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:11:04.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:11:04.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:11:04.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:11:04.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:11:04.030 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:dc:d0:e9:43:89:c9:45:3a:28:dc:c5:6c:a4:b0:bb:20:22:d8:6e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:15:27.448 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:15:27.450 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:15:27.452 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-18 20:15:27.453 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:15:27.454 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-18 20:15:27.455 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:15:27.455 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:15:27.455 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:15:27.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:15:27.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:15:27.460 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:15:27.461 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:15:27.461 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:15:27.462 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:15:27.663 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:15:27.663 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:15:27.664 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:15:27.664 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:15:27.666 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:15:27.667 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:15:27.667 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:15:27.668 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:15:27.668 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:15:27.669 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:15:27.669 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:15:27.670 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:15:27.671 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:15:27.671 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:15:27.671 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:15:27.673 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:15:27.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:c0:44:c7:6f:f0:94:41:13:13:3e:88:0e:7b:ce:73:60:94:94:d3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:18:24.865 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:18:24.868 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:18:24.872 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 20:18:24.892 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:18:24.893 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 20:18:24.894 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:18:24.894 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:18:24.895 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:18:24.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:18:24.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:18:24.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:18:24.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:18:24.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:18:24.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:18:25.088 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:18:25.089 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:18:25.090 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:18:25.090 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:18:25.091 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:18:25.091 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:18:25.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:18:25.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:18:25.093 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:18:25.093 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:18:25.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:18:25.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:18:25.095 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:18:25.095 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:18:25.096 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:18:25.097 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:18:25.101 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:f3:5a:86:14:29:33:95:e5:51:dd:f7:f4:f5:99:07:a0:6e:1b:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:25:34.474 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:25:34.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:25:34.478 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 20:25:34.478 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:25:34.479 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 20:25:34.479 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:25:34.480 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:25:34.480 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:25:34.480 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:25:34.481 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:25:34.486 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:25:34.487 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:25:34.487 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:25:34.487 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:25:34.628 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:25:34.629 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:25:34.629 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:25:34.630 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:25:34.631 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:25:34.631 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:25:34.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:25:34.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:25:34.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:25:34.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:25:34.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:25:34.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:25:34.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:25:34.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:25:34.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:25:34.636 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:25:34.638 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: c99d987ab45a9ba38df29e6c436f03d80db5d022bf46cde07eed0cfcc5eca1e0ed5407303e812676a263d7e1643ade12c07aa2dad88cda59ec87f5d1dc81c358248a45fe2cad5348fbfc668696f0870dd0b482707e407a0a627425c0c3517bde9979c542b1d66c59d3236c4fafd0e7e3c25ed36a69df89d8356ede02cef31f236a37f506920b8de0bfd27b623431639b17d475db9b161676ec7821775b7036c1df11930244f91aae030346630c2ab6df51bd28f150f60e026483348242fb0f98788b1acbac20bc1ce326504efc0e2dfd593c3926df52c1d79a301d4a5cf6ce811a624f39ae0670946f8e91c21d9c8df29777cf2556875cd66386540784f80693cafc41dacc36e9dc512192a8120a58babaa28df5e21db52d0b6f78c57dcb9767725386d054c1e121523cd9a1b171107f99522d72406c784cba7ebc0e67a81e25e7c91c2363b7780e8fa34500b71837700ac09ce96cb95cb1f46e069dbf0ed407368f0368786a343a0e84b7a2fb9e739d1d595cfcf282c2d8b726209a3565364d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:30:89:e7:f3:fa:0c:9b:4b:40:f0:8e:52:34:06:95:70:93:c3:8c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:31:43.697 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:31:43.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:31:43.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-18 20:31:43.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:31:43.704 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-18 20:31:43.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:31:43.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:31:43.706 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:31:43.706 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:31:43.707 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:31:43.711 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:31:43.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:31:43.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:31:43.713 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:31:43.881 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:31:43.882 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:31:43.882 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:31:43.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:31:43.884 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:31:43.884 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:31:43.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:31:43.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:31:43.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:31:43.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:31:43.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:31:43.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:31:43.888 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:31:43.888 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:31:43.889 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:31:43.890 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:31:43.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:b6:95:e5:2f:11:2d:7f:9e:2a:93:f9:30:f6:5c:aa:bb:3b:5b:8f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:38:26.317 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:38:26.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:38:26.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 20:38:26.324 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:38:26.325 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 20:38:26.325 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:38:26.326 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:38:26.326 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:38:26.327 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:38:26.327 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:38:26.331 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:38:26.332 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:38:26.332 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:38:26.333 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:38:26.512 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:38:26.514 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:38:26.515 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:38:26.515 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:38:26.518 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:38:26.518 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:38:26.519 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:38:26.519 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:38:26.519 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:38:26.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:38:26.522 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:38:26.522 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:38:26.523 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:38:26.524 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:38:26.524 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:38:26.525 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:38:26.530 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:23:4d:ef:6f:0b:4f:a4:65:01:29:da:21:df:b1:15:7b:e0:8e:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 20:38:45.428 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 20:38:45.430 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 20:38:45.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 20:38:45.432 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 20:38:45.432 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 20:38:45.434 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 20:38:45.435 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 20:38:45.435 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 20:38:45.435 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 20:38:45.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 20:38:45.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 20:38:45.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:38:45.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 20:38:45.441 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:38:45.567 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 20:38:45.567 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 20:38:45.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 20:38:45.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 20:38:45.570 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 20:38:45.570 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 20:38:45.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:38:45.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:38:45.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:38:45.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:38:45.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:38:45.573 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:38:45.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 20:38:45.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 20:38:45.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 20:38:45.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 20:38:45.579 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 356974350663790273816388412187245995532857507191 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 17:06:44 UTC 2022 Final Date: Wed Nov 17 17:06:43 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [93:af:1a:ba:7b:23:18:40:1c:a1:a5:65:eb:a9:bf:bd:fe:83:0f:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30355d9d36f93b8642d9fca72a1e28d614a4edbc 8b89d6fcf60a00badd46c4903531bc3f1e82dab9 7092819404c1306288409dac08649d7faeb457fb 64e56c562c8328d3bd1119ed40217fb162bb3a1b 7fd62ba39492904cd59bf02ea0db6973c011f96b a5a53b431cec35dabef5e9f437c8b31386e35903 556951c6f8cea385319736167a2d829f79e835eb 387ada07907ec2c5e7b5075b1092bfd12e46c5a9 76b678b1bd01723a46bace8e51a65515dd0af566 638016957439736d7742acbbbc755b1a536e9db7 eaf89a8f8820280dca3151f60d85313c0493cce2 ad4abc276754e40e461f2831c0a0aa93e0f7ce86 2cea9fe8214cb9ad36081689aff4f27ae79ee2b6 3da258ddff91dac142521ce5e85763ba890c2515 0cd9f7451e70e4b03c7c3e0dfcc48dc262eecb41 ef36dab465394e9e9cde9d6477af921cae7c1211 e1866b90ca94d228a521ad78b7a46b49c62cb966 02214f3cded99c9f47e594fd0efe242616a9e042 b4b3f3c3f3247188d424cf66f85d7ffda5baf664 7cb1ecf4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:bb:b5:9f:35:56:f4:8d:1c:03:31:8c:02:c7:14:8e:f6:8b:9e:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]