By type
2022-11-28 08:59:56,038 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-28 08:59:57,491 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-28 08:59:58.244 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 28, 2022 9:00:00 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 28, 2022 9:00:00 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 28, 2022 9:00:00 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 28, 2022 9:00:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-28 09:00:00.840 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-28 09:00:01.132 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-28 09:00:01.321 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-28 09:00:02.175 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-28 09:00:02.177 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-28 09:00:02.179 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-28 09:00:02.183 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-28 09:00:02.225 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-11-28 09:00:02.228 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-28 09:00:02.346 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-28 09:00:03.016 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 28, 2022 9:00:03 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-28 09:00:03.961 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.945 seconds (JVM running for 10.678) Nov 28, 2022 9:00:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-28 09:01:19.616 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 09:01:19.626 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 09:01:19.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-28 09:01:19.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 09:01:19.698 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-28 09:01:19.701 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 09:01:19.702 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 09:01:19.703 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 09:01:19.704 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 09:01:19.708 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 09:01:19.719 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 09:01:19.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 09:01:19.786 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 09:01:19.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 09:01:19.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 09:01:19.802 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 09:01:20.630 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 09:01:20.633 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 09:01:20.634 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 09:01:20.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 09:01:20.647 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 09:01:20.648 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 09:01:20.649 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 09:01:20.649 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 09:01:20.650 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 09:01:20.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 09:01:20.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 09:01:20.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 09:01:20.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 09:01:20.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 09:01:20.676 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 09:01:20.677 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 09:01:20.714 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:71:f3:6a:b8:d8:7d:dc:91:7d:8e:d1:48:b0:a8:29:51:1a:5c:08],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 14:50:10.325 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 14:50:10.335 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 14:50:10.339 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-28 14:50:10.341 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 14:50:10.342 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-28 14:50:10.343 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 14:50:10.344 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 14:50:10.345 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 14:50:10.346 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 14:50:10.346 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 14:50:10.353 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 14:50:10.354 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:50:10.355 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:50:10.355 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:50:10.598 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 14:50:10.599 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 14:50:10.600 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 14:50:10.600 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:50:10.603 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 14:50:10.604 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 14:50:10.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:50:10.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:50:10.606 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:50:10.607 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:50:10.608 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:50:10.608 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:50:10.610 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:50:10.610 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:50:10.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:50:10.612 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 14:50:10.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:c4:0b:64:4b:ba:76:05:f9:c5:0e:68:e8:9f:20:c1:5c:c0:dd:f9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 14:51:58.621 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 14:51:58.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 14:51:58.624 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-28 14:51:58.625 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 14:51:58.626 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-28 14:51:58.627 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 14:51:58.627 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 14:51:58.628 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 14:51:58.628 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 14:51:58.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 14:51:58.634 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 14:51:58.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:51:58.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:51:58.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:51:58.769 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 14:51:58.769 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 14:51:58.770 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 14:51:58.770 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:51:58.773 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 14:51:58.773 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 14:51:58.774 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:51:58.774 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:51:58.774 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:51:58.775 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:51:58.776 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:51:58.776 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:51:58.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:51:58.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:51:58.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:51:58.778 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 14:51:58.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:1d:e2:54:f2:6b:ed:71:ec:c5:33:6f:3b:aa:ec:5d:b2:68:e2:67],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 14:53:48.851 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 14:53:48.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 14:53:48.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-28 14:53:48.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 14:53:48.860 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-28 14:53:48.861 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 14:53:48.862 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 14:53:48.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 14:53:48.862 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 14:53:48.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 14:53:48.867 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 14:53:48.868 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:53:48.868 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:53:48.869 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:53:49.010 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 14:53:49.010 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 14:53:49.011 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 14:53:49.011 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:53:49.013 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 14:53:49.013 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 14:53:49.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:53:49.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:53:49.015 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:53:49.016 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:53:49.016 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:53:49.016 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:53:49.017 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:53:49.018 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:53:49.018 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:53:49.019 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 14:53:49.025 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:64:bf:13:59:0d:a8:00:e6:d9:f7:e4:c9:de:c1:f3:6d:c0:bf:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 14:57:16.962 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 14:57:16.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 14:57:16.965 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-28 14:57:16.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 14:57:16.967 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-28 14:57:16.967 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 14:57:16.968 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 14:57:16.968 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 14:57:16.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 14:57:16.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 14:57:16.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 14:57:16.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:57:16.974 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 14:57:16.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:57:17.150 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 14:57:17.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 14:57:17.151 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 14:57:17.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 14:57:17.153 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 14:57:17.154 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 14:57:17.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:57:17.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:57:17.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:57:17.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:57:17.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:57:17.156 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:57:17.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 14:57:17.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 14:57:17.158 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 14:57:17.159 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 14:57:17.162 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:94:ba:4c:b6:dd:65:9e:10:93:39:35:70:cd:07:ad:5a:40:67:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 15:08:02.102 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 15:08:02.105 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 15:08:02.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-28 15:08:02.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 15:08:02.109 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-28 15:08:02.110 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 15:08:02.111 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 15:08:02.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 15:08:02.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 15:08:02.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 15:08:02.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 15:08:02.119 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:08:02.119 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:08:02.120 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:08:02.292 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 15:08:02.294 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 15:08:02.294 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 15:08:02.295 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:08:02.296 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 15:08:02.296 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 15:08:02.297 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:08:02.297 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:08:02.298 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:08:02.299 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:08:02.299 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:08:02.299 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:08:02.300 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:08:02.300 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:08:02.301 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:08:02.302 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 15:08:02.305 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: af801b2d5aa58785ad3ef695764d5fb65d2214cecb391043cd7b294e1987486a8f65db6bc36bfb2da4c8034065d0da7aeacc7671f9dd3f198a8e01f78ac9ca1e9e928433b79b05e8c0d41b9a2b52c49124eeb1f9cba34ae201bb59c9151bbb3ba2a9c0d03545fffc8d579d015e80e73282642c929aac50ee4ffa0175a014fbde2e96928759c593a70302c7003859e7efc45076efde900cb1abbc651b8e84d06577221de480c96f1ccfc331dde0919e87c4b8d16778a6131126730a2cd3a878fb84a8e28ecc43cc78fcb46e560cd09af67fa0427d0878f86ef72eec3ff71c758a28d2b7dc8bfa24dce7fe2b44d5304c9c8dad3981bb468c4549948d069255f326783e7606485aa6d02ee0785e603c01248ffef2ab0fa0038e686c2a6eb9f29654493f3cacb71f2decf72db3b538da118404afe007fad1b99666f37e66a79d7564c0350d3141ce2dff4b70debf7c0fa841cae13e32e7168517026e09dc1c00bbb284c592c769d07ef1447086c4d31abee9818db8c6b4641dece03589fae6e734a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:14:87:bd:b2:db:d6:f6:3e:9c:a1:c5:32:14:b8:64:f0:48:20:14],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 15:15:02.923 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 15:15:02.927 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 15:15:02.930 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-28 15:15:02.931 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 15:15:02.931 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-28 15:15:02.932 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 15:15:02.933 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 15:15:02.933 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 15:15:02.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 15:15:02.935 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 15:15:02.939 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 15:15:02.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:15:02.941 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:15:02.941 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:15:03.128 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 15:15:03.129 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 15:15:03.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 15:15:03.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:15:03.132 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 15:15:03.132 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 15:15:03.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:15:03.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:15:03.133 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:15:03.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:15:03.135 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:15:03.135 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:15:03.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:15:03.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:15:03.137 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:15:03.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 15:15:03.141 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:e6:60:0f:94:73:e7:b1:98:6d:4f:75:44:05:6c:cd:5d:40:79:cc],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 15:15:22.218 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 15:15:22.220 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 15:15:22.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-28 15:15:22.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 15:15:22.222 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-28 15:15:22.222 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 15:15:22.222 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 15:15:22.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 15:15:22.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 15:15:22.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 15:15:22.229 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 15:15:22.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:15:22.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:15:22.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:15:22.362 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 15:15:22.363 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 15:15:22.363 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 15:15:22.364 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:15:22.365 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 15:15:22.365 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 15:15:22.366 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:15:22.366 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:15:22.366 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:15:22.367 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:15:22.367 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:15:22.367 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:15:22.368 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:15:22.368 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:15:22.368 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:15:22.369 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 15:15:22.372 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:28:1b:ba:7c:b7:5c:fc:24:bb:fc:04:5c:53:2d:8f:05:71:50:07],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 15:39:57.288 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 15:39:57.291 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 15:39:57.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-28 15:39:57.294 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 15:39:57.294 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-28 15:39:57.295 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 15:39:57.296 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 15:39:57.296 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 15:39:57.296 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 15:39:57.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 15:39:57.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 15:39:57.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:39:57.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:39:57.303 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:39:57.436 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 15:39:57.436 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 15:39:57.437 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 15:39:57.437 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:39:57.440 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 15:39:57.440 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 15:39:57.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:39:57.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:39:57.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:39:57.442 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:39:57.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:39:57.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:39:57.444 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:39:57.444 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:39:57.444 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:39:57.445 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 15:39:57.449 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: af801b2d5aa58785ad3ef695764d5fb65d2214cecb391043cd7b294e1987486a8f65db6bc36bfb2da4c8034065d0da7aeacc7671f9dd3f198a8e01f78ac9ca1e9e928433b79b05e8c0d41b9a2b52c49124eeb1f9cba34ae201bb59c9151bbb3ba2a9c0d03545fffc8d579d015e80e73282642c929aac50ee4ffa0175a014fbde2e96928759c593a70302c7003859e7efc45076efde900cb1abbc651b8e84d06577221de480c96f1ccfc331dde0919e87c4b8d16778a6131126730a2cd3a878fb84a8e28ecc43cc78fcb46e560cd09af67fa0427d0878f86ef72eec3ff71c758a28d2b7dc8bfa24dce7fe2b44d5304c9c8dad3981bb468c4549948d069255f326783e7606485aa6d02ee0785e603c01248ffef2ab0fa0038e686c2a6eb9f29654493f3cacb71f2decf72db3b538da118404afe007fad1b99666f37e66a79d7564c0350d3141ce2dff4b70debf7c0fa841cae13e32e7168517026e09dc1c00bbb284c592c769d07ef1447086c4d31abee9818db8c6b4641dece03589fae6e734a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:ae:db:12:03:23:bb:81:eb:df:2d:5f:70:5a:ae:0d:eb:8e:11:3a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-28 15:40:02.460 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-28 15:40:02.460 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-28 15:40:02.462 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-28 15:40:02.462 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-28 15:40:02.462 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-28 15:40:02.463 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-28 15:40:02.463 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-28 15:40:02.464 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-28 15:40:02.464 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-28 15:40:02.464 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-28 15:40:02.468 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-28 15:40:02.468 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:40:02.468 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-28 15:40:02.468 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:40:02.569 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-28 15:40:02.570 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-28 15:40:02.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-28 15:40:02.570 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-28 15:40:02.571 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-28 15:40:02.572 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-28 15:40:02.572 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:40:02.572 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:40:02.572 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:40:02.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:40:02.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:40:02.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:40:02.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-28 15:40:02.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-28 15:40:02.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-28 15:40:02.575 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-28 15:40:02.577 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691674314065651339353378762912633257714507603471 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 28 08:57:33 UTC 2022 Final Date: Sat Nov 27 08:57:32 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695 efbbe35d95121b91efe3a9bc723b32af6926fdef caa36b2fba85419f1e1857b3aadb50880d1d05cc 4eaf104f2e785245c1585705e153e5a2bbcfa5b9 30309c6d8f8851270ee5e1888d5c6a2295067ad0 d2a81713f63e4f8b1e79363f3f04664dd70b6e8b 4f3e27ab5b3f9e41672a6b786139daf99825569d b4596b5c3da3279a9f2e2e7ecb61b753549f5095 62ace0221dcc9fd2007fb53c570d72753923515e 7bfcf8c69feeadded06b4fe561cd6197e4ef496a 6abd5e287fb10588ebc10393597899c2a4095932 eafe54735e17cf5e04d418340f935008f925a84a cbf943d31c64ef0e59131cb4b3ba4a66195b3079 5fe574df0a63c977d8c21035ba35766e204d1059 39aa0cc62d452fed0fc3dd7d8b267ca3802b335b c5260b3ae8883d14db98a1aa45c78118a4ca6a91 35dc36b0acbac89f066db08e4eeb6ad5751cf2c8 4ecc7b5c2abc254a77602684faf27bb239e037be 5328e58d6c953e816f60c8948756e79552659d56 a277f364 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:ab:d7:7c:88:66:7d:3f:75:d1:18:44:91:6a:f0:e2:ee:88:6e:3b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]