By type
2022-12-10 03:03:31,826 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-10 03:03:33,251 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-10 03:03:34.046 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 10, 2022 3:03:36 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 10, 2022 3:03:36 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 10, 2022 3:03:36 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 10, 2022 3:03:36 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-10 03:03:36.847 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-10 03:03:37.143 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-10 03:03:37.304 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-10 03:03:38.049 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-10 03:03:38.057 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-10 03:03:38.059 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-10 03:03:38.063 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-10 03:03:38.105 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-10 03:03:38.109 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-10 03:03:38.241 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-10 03:03:38.993 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 10, 2022 3:03:39 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-10 03:03:40.034 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.227 seconds (JVM running for 11.108) Dec 10, 2022 3:03:59 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-10 03:04:10.488 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 03:04:10.499 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 03:04:10.546 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-10 03:04:10.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 03:04:10.569 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-10 03:04:10.571 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 03:04:10.572 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 03:04:10.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 03:04:10.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 03:04:10.578 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 03:04:10.589 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 03:04:10.592 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 03:04:10.654 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 03:04:10.659 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 03:04:10.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 03:04:10.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 03:04:11.555 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 03:04:11.558 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 03:04:11.559 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 03:04:11.560 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 03:04:11.569 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 03:04:11.570 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 03:04:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 03:04:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 03:04:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 03:04:11.586 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 03:04:11.587 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 03:04:11.587 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 03:04:11.593 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 03:04:11.594 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 03:04:11.594 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 03:04:11.595 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 03:04:11.636 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: d132b01ee07bf550bc25b20b13ff66c826f5c5a255e5c23d90666f436d959e7f0888443b35c7488d2421aae7de5f7d215cacfc99b0ae3ab1d61426c89c55f39e2e645fa9b6390f4c0c1049a6e69f0a7a988d8d4329df37d05180b2b5c270d42b8660ae6a1c33cdc94f73df170da55edebbaa7f2f93bcd52d6b94eaba415376d97b8a65cb2af92f0f5b937a19541a4a339718d05fc07a2bc08564cbf76d344e8ac87b9f1d2408646a11127ed38e97f5a0e68f0ee259182ca609e55d2bda921547a653c9698d20557f068cff7b990a08205cebd05d1d382b224a20989368c6b08e698201ba8049450eac6af7edfaee2c5df6d2e2a7541b352b606ec00ee4d44553b3f89025a16f5a4e04ca8af8b9307ed1a9add8f355d1bf303e59ce0f0471265e21c1ea4a96ecf65933adfeddbfd90018716f56734b8c435594b38083d1d644cb533f74bc9d43db1b9536542d3bd6b0ed2f584ff2c005d9cd80dd067ab9f84666ff0ef7c706841bd09aef6a6f6e912f7ea0b3a369f71f0203d7e8eb4b9cf3e553 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:3f:be:2e:e1:73:10:5d:d9:bd:73:70:ba:bc:62:9b:9b:c7:f4:60],[56:66:d1:a4] modulus: c111a41333b605efe0381b6e434dc657ce4e0b76bdcee4be5019e2d2f127a7200ff3e12b19bd55e911cdced8d7bf42729d69cb6364a5e5e6a0365895ccb960fe07bf16f460060ec8c9c843cb03aacdc60e277c2069b3dc58eb81c932a397050119b6d31c000af297e457972ee8bf1a3b9aa96a1443a535fd920066e4ad97e1f6dbd775857cf0706f806e224b6780f5009d1f94645c3dc5ec9f0f7b058095ee1d3170308bae85f214ed6830d5e5b159e25864df806f3d4d21a53b6dcba86630c1d92f1b90dc03cc6c52e25ac537e03baada249e07079e06d114192f58169d51411fa7668c14b176edbcc56c01a0b2837806ece7f8d6a35d741a2feb02df637db1 public exponent: 10001 ] 2022-12-10 09:10:55.472 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:10:55.476 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:10:55.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-10 09:10:55.481 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:10:55.482 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-10 09:10:55.483 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:10:55.483 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:10:55.484 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:10:55.484 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:10:55.485 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:10:55.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:10:55.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:10:55.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:10:55.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:10:55.692 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:10:55.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:10:55.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:10:55.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:10:55.697 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:10:55.698 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:10:55.698 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:10:55.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:10:55.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:10:55.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:10:55.701 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:10:55.701 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:10:55.702 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:10:55.703 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:10:55.703 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:10:55.704 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:10:55.709 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:32:b6:f2:61:61:3f:6c:52:b9:74:e0:ba:66:fc:c6:ce:b4:c9:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:12:43.549 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:12:43.551 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:12:43.554 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-10 09:12:43.556 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:12:43.556 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-10 09:12:43.557 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:12:43.558 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:12:43.558 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:12:43.559 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:12:43.560 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:12:43.564 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:12:43.565 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:12:43.565 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:12:43.566 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:12:43.694 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:12:43.695 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:12:43.696 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:12:43.696 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:12:43.698 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:12:43.698 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:12:43.698 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:12:43.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:12:43.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:12:43.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:12:43.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:12:43.701 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:12:43.702 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:12:43.702 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:12:43.702 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:12:43.703 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:12:43.707 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: d132b01ee07bf550bc25b20b13ff66c826f5c5a255e5c23d90666f436d959e7f0888443b35c7488d2421aae7de5f7d215cacfc99b0ae3ab1d61426c89c55f39e2e645fa9b6390f4c0c1049a6e69f0a7a988d8d4329df37d05180b2b5c270d42b8660ae6a1c33cdc94f73df170da55edebbaa7f2f93bcd52d6b94eaba415376d97b8a65cb2af92f0f5b937a19541a4a339718d05fc07a2bc08564cbf76d344e8ac87b9f1d2408646a11127ed38e97f5a0e68f0ee259182ca609e55d2bda921547a653c9698d20557f068cff7b990a08205cebd05d1d382b224a20989368c6b08e698201ba8049450eac6af7edfaee2c5df6d2e2a7541b352b606ec00ee4d44553b3f89025a16f5a4e04ca8af8b9307ed1a9add8f355d1bf303e59ce0f0471265e21c1ea4a96ecf65933adfeddbfd90018716f56734b8c435594b38083d1d644cb533f74bc9d43db1b9536542d3bd6b0ed2f584ff2c005d9cd80dd067ab9f84666ff0ef7c706841bd09aef6a6f6e912f7ea0b3a369f71f0203d7e8eb4b9cf3e553 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:f0:40:b3:57:8b:5e:74:1a:73:76:3f:8a:b8:cd:e4:8b:0f:8f:9a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:14:31.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:14:31.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:14:31.766 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-10 09:14:31.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:14:31.768 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-10 09:14:31.769 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:14:31.769 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:14:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:14:31.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:14:31.771 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:14:31.776 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:14:31.777 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:14:31.778 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:14:31.778 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:14:31.950 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:14:31.951 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:14:31.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:14:31.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:14:31.955 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:14:31.956 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:14:31.956 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:14:31.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:14:31.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:14:31.958 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:14:31.959 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:14:31.959 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:14:31.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:14:31.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:14:31.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:14:31.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:14:31.967 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:b6:00:cd:aa:63:ce:44:4e:e4:91:63:ca:31:68:07:84:a3:ea:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:17:17.197 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:17:17.198 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:17:17.200 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-10 09:17:17.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:17:17.201 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-10 09:17:17.202 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:17:17.202 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:17:17.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:17:17.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:17:17.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:17:17.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:17:17.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:17:17.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:17:17.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:17:17.354 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:17:17.355 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:17:17.356 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:17:17.356 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:17:17.358 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:17:17.359 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:17:17.359 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:17:17.359 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:17:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:17:17.360 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:17:17.361 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:17:17.361 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:17:17.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:17:17.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:17:17.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:17:17.363 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:17:17.366 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:0c:e0:ff:b3:15:6f:fd:e7:48:ef:e5:c3:f0:b4:41:4c:35:90:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:24:23.993 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:24:23.997 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:24:23.999 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-10 09:24:24.000 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:24:24.001 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-10 09:24:24.002 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:24:24.003 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:24:24.003 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:24:24.005 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:24:24.006 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:24:24.013 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:24:24.014 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:24:24.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:24:24.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:24:24.215 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:24:24.216 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:24:24.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:24:24.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:24:24.218 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:24:24.219 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:24:24.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:24:24.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:24:24.220 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:24:24.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:24:24.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:24:24.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:24:24.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:24:24.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:24:24.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:24:24.228 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:24:24.233 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:ab:95:47:15:18:85:5a:ad:72:28:84:bc:37:4c:da:1a:92:29:1f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:30:39.064 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:30:39.067 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:30:39.071 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-10 09:30:39.072 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:30:39.076 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-10 09:30:39.077 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:30:39.078 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:30:39.078 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:30:39.079 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:30:39.080 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:30:39.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:30:39.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:30:39.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:30:39.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:30:39.309 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:30:39.310 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:30:39.310 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:30:39.311 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:30:39.333 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:30:39.334 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:30:39.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:30:39.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:30:39.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:30:39.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:30:39.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:30:39.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:30:39.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:30:39.337 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:30:39.338 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:30:39.338 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:30:39.353 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:4b:de:b8:6c:49:9a:a3:d3:93:e5:df:84:83:a1:be:47:86:ec:6c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:30:56.333 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:30:56.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:30:56.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-10 09:30:56.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:30:56.343 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-10 09:30:56.344 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:30:56.344 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:30:56.345 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:30:56.346 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:30:56.346 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:30:56.352 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:30:56.353 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:30:56.353 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:30:56.354 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:30:56.493 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:30:56.494 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:30:56.494 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:30:56.494 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:30:56.496 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:30:56.496 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:30:56.497 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:30:56.498 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:30:56.498 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:30:56.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:30:56.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:30:56.500 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:30:56.500 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:30:56.501 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:30:56.501 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:30:56.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:30:56.506 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:46:cb:84:af:b8:6e:98:bf:4d:1c:a2:08:c8:ea:b2:af:6c:72:9c],[56:66:d1:a4] modulus: d77d7445a8d42195c614491334bd1a566ff23516d4e85dea8945a38c905c89b0d59323a97693fbe7072849c6a85020f7c0d6a3a303c6a1b7926e455168ef6de3ed8ece130002298fd02e2b6c600848fa42235621908eceb7a5d09ddc49721e656e4c90bf97cd51a951b7a6906a4a9ebd6d9a94d353aa3076ea2edc15f0786eeeeb51090eb885f5e0c2cefd44c8d3031afd3700d36bdf3f3ab19cc8485bbb16dd24e2f422d8f33f298afd7127538d0d89faa522cc0a64b121758821e0815b67ba1f43f7ef02d7423ecb4074d4171ab51259f0a59c1ddb54584c0aaa059c69fee60a2f3e6272b3adc893c225732a578deeb7ac7ac60160820a8db5b577050cef8b public exponent: 10001 ] 2022-12-10 09:54:00.917 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:54:00.920 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:54:00.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-10 09:54:00.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:54:00.925 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-10 09:54:00.926 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:54:00.926 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:54:00.927 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:54:00.927 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:54:00.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:54:00.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:54:00.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:54:00.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:54:00.935 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:54:01.118 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:54:01.119 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:54:01.120 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:54:01.120 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:54:01.122 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:54:01.122 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:54:01.123 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:54:01.124 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:54:01.124 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:54:01.125 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:54:01.126 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:54:01.126 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:54:01.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:54:01.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:54:01.128 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:54:01.128 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:54:01.132 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:17:48:fb:f7:2c:7f:a8:27:63:f0:3b:59:b7:3d:c8:e3:b6:22:56],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-10 09:54:06.081 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-10 09:54:06.082 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-10 09:54:06.084 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-10 09:54:06.084 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-10 09:54:06.085 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-10 09:54:06.085 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-10 09:54:06.086 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-10 09:54:06.086 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-10 09:54:06.086 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-10 09:54:06.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-10 09:54:06.090 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-10 09:54:06.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:54:06.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-10 09:54:06.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:54:06.199 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-10 09:54:06.200 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-10 09:54:06.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-10 09:54:06.201 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-10 09:54:06.203 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-10 09:54:06.203 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-10 09:54:06.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:54:06.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:54:06.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:54:06.205 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:54:06.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:54:06.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:54:06.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-10 09:54:06.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-10 09:54:06.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-10 09:54:06.208 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-10 09:54:06.211 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66749063822399398628369202901539483414278212412 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 10 03:00:34 UTC 2022 Final Date: Thu Dec 09 03:00:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3 778dc1cba2f1bd78ff6fd4794aef111365437892 54a699fa9e25c656276abe72896d3fff33028104 30f2fc2d24c3b0f743af20fefa48baac616dc6cb d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f ccd75fd178ccd8895ed8bdfec05f7b4c983469aa 8446eb5670f70ba240e446cc5bf8488f344c3e61 862aa04d79a933cf1e9a29576c1919b6a36275b2 562de42b337d79e038bf14df7c3cc54416ac1582 d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e 5ff3f55aac7d1ed67685520267d34118f8be01af 0eae1df37fc5ae9d4a00b2db38cfe541a2f86592 9347a112fde4d15c2c709280140ab868a6752bab c05f0a4fa113258b9a40a89f22267aee3590cd45 954bf2abc569dad4b2cd73dbcdaa67f387dfbea1 76c85ff7a53db89375ebb4a08e070b9d83ce33bf a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f 07b9d74425c5267dfeca5f6d79a9586fdfa41f0f e285136d5b05b39d9971cff4063035a0b5fdb803 e4ebbb5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:99:6d:9b:8f:9a:d6:d9:b8:31:02:c6:41:5a:69:25:09:b1:69:7e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]