By type
2022-05-13 11:31:29,610 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-13 11:31:35,006 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-13 11:31:38.518 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 13, 2022 11:31:49 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 13, 2022 11:31:49 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 13, 2022 11:31:49 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 13, 2022 11:31:49 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-13 11:31:51.523 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-13 11:31:53.020 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-13 11:31:53.914 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-13 11:31:57.326 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-13 11:31:57.406 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-13 11:31:57.408 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-13 11:31:57.412 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-13 11:31:57.608 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-13 11:31:57.613 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-13 11:31:58.208 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-13 11:32:03.118 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 13, 2022 11:32:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-13 11:32:07.915 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 42.1 seconds (JVM running for 50.171) May 13, 2022 11:32:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-13 11:33:13.218 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 11:33:13.311 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 11:33:13.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-13 11:33:13.507 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 11:33:13.523 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-13 11:33:13.606 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 11:33:13.608 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 11:33:13.609 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 11:33:13.610 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 11:33:13.612 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 11:33:13.618 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 11:33:13.622 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 11:33:13.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 11:33:13.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 11:33:13.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 11:33:13.921 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 11:33:15.680 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 11:33:15.682 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 11:33:15.682 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 11:33:15.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 11:33:15.692 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 11:33:15.692 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 11:33:15.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 11:33:15.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 11:33:15.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 11:33:15.715 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 11:33:15.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 11:33:15.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 11:33:15.721 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 11:33:15.721 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 11:33:15.722 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 11:33:15.805 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 11:33:15.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:96:95:f0:5d:3e:a9:91:88:48:67:c3:6a:18:df:49:fe:a9:e5:55] modulus: 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 public exponent: 10001 ] 2022-05-13 14:35:10.005 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:35:10.007 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:35:10.009 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:35:10.010 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:35:10.012 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:35:10.013 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:35:10.013 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:35:10.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:35:10.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:35:10.015 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:35:10.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:35:10.025 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:35:10.025 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:35:10.025 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:35:10.242 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:35:10.243 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:35:10.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:35:10.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:35:10.313 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:35:10.313 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:35:10.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:35:10.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:35:10.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:35:10.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:35:10.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:35:10.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:35:10.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:35:10.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:35:10.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:35:10.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:35:10.330 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:94:cc:16:de:70:8b:52:67:8a:47:35:ea:3a:eb:75:d3:64:f2:dc] modulus: b4d4e9f3febbd6f6e6b3792608e90da1ac60ab87fdd3183d41e2ebab3fe0da5ef96e53756065835010239559c1b0b2cbf5c2fe0c7d9fa366a981164eb333f7af3daaa5f28c7b274b6aaf74c010e698b918bc29cfdf9e6ccf931872db4e2047aa4ef1ce73f74408021647cf0803e09b6fc979b8d2114ea1ab479bac196b07d16c7bcd66a7a44a5633ba20acaeb17b1a88375c8dbbfb653d57508b19bf4a668885aa15d65db1ab895a6d61ebefa100c201b7f3eb3d1256330db46fc220b1e5e92342465cf69d71defbaa6f4841553892c752edb94d77333451b6cde4ec30aeca2df8c1bdd204c34b0a3f6ccbf71fd4536805c4840ba030eda14b6a81afeb171553 public exponent: 10001 ] 2022-05-13 14:38:54.440 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:38:54.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:38:54.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:38:54.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:38:54.445 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:38:54.446 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:38:54.446 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:38:54.447 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:38:54.447 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:38:54.448 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:38:54.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:38:54.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:38:54.456 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:38:54.456 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:38:54.607 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:38:54.608 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:38:54.608 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:38:54.609 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:38:54.612 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:38:54.613 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:38:54.614 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:38:54.614 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:38:54.615 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:38:54.616 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:38:54.616 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:38:54.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:38:54.618 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:38:54.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:38:54.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:38:54.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:38:54.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:d0:34:a3:3c:ee:97:0f:0b:3b:01:2d:1a:bc:99:26:5d:fa:67:62] modulus: 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 public exponent: 10001 ] 2022-05-13 14:40:59.631 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:40:59.632 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:40:59.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-13 14:40:59.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:40:59.635 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-13 14:40:59.635 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:40:59.636 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:40:59.636 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:40:59.636 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:40:59.637 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:40:59.646 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:40:59.646 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:40:59.647 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:40:59.647 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:40:59.804 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:40:59.805 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:40:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:40:59.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:40:59.807 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:40:59.808 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:40:59.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:40:59.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:40:59.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:40:59.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:40:59.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:40:59.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:40:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:40:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:40:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:40:59.811 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:40:59.814 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: b7b92678cd394a5737dc27bfa8414abaef6c2daab09aef4857c55252e5a9c5b5577d96a4a44cd4b58babbdfcbf6f5e0e47291d8cd2ca13cc546d8fc21e00dd59263b820da5176a794a3adc689a0d2d3c6ef13a43dd26e9e91d1fd3a1c066e28029d2418c35de0b7f7590e29b3cc1ee6bbd0305bf9ed1d70b83d51bc5c0936207431459109dd1a1b6bff928f06fae1bb2cbfaed3be31101ab0776e5bb0a51f29639ba7f5aabb48d01b04ffd7be7edb57261c057399144483c9f9e260a1a1cd88be41be3de8e9655976efcb228d9013a5f3f8d591880f73cdd91a0ff7fc9dabc72c65ab7b551188459dd6771560f32eb3fb9d6a13fa9748023f3e9b16553e6d5112581c4fe98448a6186f1f7fa2616091756244fa615605f4b155061802dd7f440dee4f54610b44bf5430d330992106a29b013b43646f10e427356e4e46bfdede4ed7c5812876f39ffe4422e73d79dbabd9f9734baa18a21fca190a1ec4fb92d9c758108e51224deeaaba62305fe300b94fdb43800681321cbc5da984a2c1adae3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:4e:cf:e1:c7:ec:0b:60:0b:cf:6c:5e:fe:f3:ea:51:18:3f:87:8f] modulus: c09f7cc3664fd02e720169d3f8414ca9cb82adf8e8ab7800cad6ec696e1fbbf4d78a8561c46e2eb73adced054fe3b88686b6e516700698363a15121f56d33ec09ab49060e81c8e2b9552f0afb4c4d2bc443e5aba410580f50b4486e70e688d9182aa668dfc2d08057f6067c786dc4c5974eefcc43b4d34014445e7d648e246157cd189e7be3ffecca04ebfedea8ccca0f9ab0188ed24f3d97ee9ed05ad68c25bb98a1d7e6c9f90ef26aaf1d57b3c2c4a7beb32381db27dfcf8b72ca505496d5fba267b7b2a9a841d02cb6dc07a9a22e9f6754882e57887f8dd047dd7da54c070ddbc6207592cffc144d2d006759faf48170e1a4dd781163e97b293daf43af66b public exponent: 10001 ] 2022-05-13 14:44:09.779 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:44:09.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:44:09.782 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-13 14:44:09.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:44:09.784 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-13 14:44:09.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:44:09.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:44:09.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:44:09.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:44:09.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:44:09.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:44:09.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:44:09.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:44:09.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:44:09.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:44:09.894 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:44:09.903 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:44:09.903 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:44:09.906 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:44:09.907 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:44:09.907 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:44:09.907 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:44:09.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:44:09.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:44:09.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:44:09.909 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:44:09.909 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:44:09.909 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:44:09.909 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:44:09.910 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:44:09.913 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:df:9f:74:ec:d0:bb:f9:37:06:94:4a:73:3a:d4:5d:2a:8a:64:a1] modulus: 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 public exponent: 10001 ] 2022-05-13 14:48:01.156 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:48:01.158 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:48:01.164 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:48:01.165 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:48:01.165 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-13 14:48:01.166 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:48:01.166 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:48:01.167 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:48:01.167 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:48:01.167 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:48:01.172 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:48:01.172 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:48:01.172 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:48:01.173 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:48:01.294 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:48:01.303 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:48:01.304 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:48:01.304 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:48:01.306 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:48:01.307 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:48:01.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:48:01.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:48:01.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:48:01.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:48:01.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:48:01.310 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:48:01.310 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:48:01.311 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:48:01.311 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:48:01.311 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:48:01.314 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0e:33:35:47:ec:f1:20:e9:eb:c9:c5:b1:7a:71:09:b6:f8:14:32:cc] modulus: b39c66d2f0b72de9900cb210e999610f2ca5ae5cb91b757d69eb57957a067c26f284d70b21c4b7d3b1fb2ac6d9dafdef423414c71bdb99b9325b005122339ca28817fec236cf7db417127702f80f955be03eb7ceba03b605e3e8c9c2f0c42bc17225677c1f7b999ad150d0a90897a0fc03ce2cfb3ad16f1f21406fc4ed55c88219b01c61ffc822561a60a62202acb5beba9262afb50df07492a1e5623eddff1f0341dce8f70d2a9910b454637980e7df8968e21c7948896b8bee878c8e3e1f02a21942489933627b2ed8ecf65d0e14bd93a953738f80267253c5728959e4cc123247ca591acd544b3b29b9fd12921ce1da4ef9d8ffb6d3628839c00e9ef8e9fd public exponent: 10001 ] 2022-05-13 14:52:36.011 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 14:52:36.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 14:52:36.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-13 14:52:36.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 14:52:36.015 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-13 14:52:36.015 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 14:52:36.016 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 14:52:36.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 14:52:36.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 14:52:36.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 14:52:36.021 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 14:52:36.021 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:52:36.021 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 14:52:36.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:52:36.125 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 14:52:36.125 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 14:52:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 14:52:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 14:52:36.127 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 14:52:36.127 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 14:52:36.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:52:36.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:52:36.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:52:36.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:52:36.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:52:36.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:52:36.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 14:52:36.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 14:52:36.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 14:52:36.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 14:52:36.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:3d:d8:e8:65:b4:c0:16:2f:5c:c2:ed:3d:d4:ee:9d:22:3d:90:be] modulus: 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 public exponent: 10001 ] 2022-05-13 15:02:20.284 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 15:02:20.286 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 15:02:20.288 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-13 15:02:20.289 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 15:02:20.289 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-13 15:02:20.290 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 15:02:20.290 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 15:02:20.290 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 15:02:20.291 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 15:02:20.291 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 15:02:20.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 15:02:20.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 15:02:20.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 15:02:20.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 15:02:20.422 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 15:02:20.423 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 15:02:20.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 15:02:20.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 15:02:20.426 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 15:02:20.426 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 15:02:20.427 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 15:02:20.427 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 15:02:20.427 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 15:02:20.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 15:02:20.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 15:02:20.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 15:02:20.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 15:02:20.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 15:02:20.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 15:02:20.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 15:02:20.438 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:55:17:ca:05:ab:bd:86:47:42:e9:99:38:da:2c:64:61:8a:25:d0] modulus: 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 public exponent: 10001 ] 2022-05-13 15:03:58.356 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-13 15:03:58.357 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-13 15:03:58.359 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-13 15:03:58.359 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-13 15:03:58.359 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-13 15:03:58.360 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-13 15:03:58.360 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-13 15:03:58.360 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-13 15:03:58.361 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-13 15:03:58.361 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-13 15:03:58.366 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-13 15:03:58.367 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 15:03:58.367 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-13 15:03:58.367 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 15:03:58.453 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-13 15:03:58.453 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-13 15:03:58.454 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-13 15:03:58.454 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-13 15:03:58.455 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-13 15:03:58.456 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-13 15:03:58.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 15:03:58.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 15:03:58.457 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 15:03:58.457 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 15:03:58.457 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 15:03:58.458 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 15:03:58.459 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-13 15:03:58.459 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-13 15:03:58.459 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-13 15:03:58.460 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-13 15:03:58.462 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250495301442293134729163443788767687234862987196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 13 11:27:39 UTC 2022 Final Date: Wed May 12 11:27:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98977b5ab7af97add6af5e935068287898f63b54 5d7811f1e7650069f0329687fce69291631abef0 48af143855d93c4035970a3ed6a7a2514ae70d22 348ef40a588a06efecd840859d5c8aa660c25ccd e8c2900f4d2c681afab422c537327a3694cefdfe 555353b1351542772b0a168af9debcfdcb1e145f cf1065498e2c040ecb3904d65a82a9e51b56ccf8 6e44a3e7af3f5d221be540f3a2e1393001685820 7a8423527a4a395411a69fa6847a9285d9864791 7f78322b39e9ddf8ee28af9ae69ff629b68a0598 a578ad69c7373ccba43fa928d32b71134fd92262 7876cf36a0c55387a7fc0823baaeb131b881ead3 e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38 3ba28904695adec57d8430f31fd80effa906ab40 13392e39882a2780621fea3b2d3401780f712651 6a1590a8b95a36d7370f578f5bd507a97d102418 7a7c67e59b797e2bfb472da5206b5815838bb1fe 3dbcf02ae00ad1231000a8372a765aa744ca823c db9842181f44da03d60872dabc3167482ab76303 da89871f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:fd:c3:ad:8c:1a:81:ee:62:69:b8:c0:ae:7a:67:09:3e:de:2e:b5] modulus: b991ddbd8e5635253d78a0afc309486052a7078bf5fe92ba24cf212644a7eadeaf5b53810cf14301bcfdf9d67f834d6d176262ed25cb94a33dcacbffdb28c4711fbefea6e827cbcaea4e75a97fdc8dbdd7a761e57acdb1dbb871a4e4d679729035f5921209e25dd7dbfb0a0e8147d938bce84f401a721cbb74f07590b8b4619ae65426b1dfd858ed0aac1e1758c89318616d396511cefe9a16ef9ce0ec31efb767fd8312621f43e43cb7515176984b1d37d9c55379323d45ac64d316abcb65fc12eb90b8744b90762613203846912cd25f70d46ca9dfd84645584ad363f0736800273ea35d08d7a61465553294a342a42a24e3b6cb8bbe8ca5482a72aaefa665 public exponent: 10001 ]