By type
2022-07-08 14:03:01,174 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-08 14:03:02,114 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-08 14:03:02.919 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jul 08, 2022 2:03:05 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 08, 2022 2:03:05 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 08, 2022 2:03:05 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 08, 2022 2:03:05 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-08 14:03:05.967 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-08 14:03:06.258 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-07-08 14:03:06.423 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-08 14:03:07.220 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-08 14:03:07.224 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-07-08 14:03:07.226 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-08 14:03:07.231 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-08 14:03:07.274 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-08 14:03:07.278 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-08 14:03:07.417 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-07-08 14:03:08.091 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 08, 2022 2:03:08 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-08 14:03:09.177 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.009 seconds (JVM running for 13.078) Jul 08, 2022 2:03:29 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-08 15:04:12.857 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:04:12.874 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:04:12.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-08 15:04:12.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:04:12.954 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-08 15:04:12.957 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:04:12.958 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:04:12.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:04:12.960 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:04:12.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:04:12.974 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:04:12.977 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:04:13.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:04:13.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:04:13.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:04:13.029 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:04:13.785 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:04:13.788 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:04:13.788 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:04:13.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:04:13.801 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:04:13.802 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:04:13.803 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:04:13.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:04:13.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:04:13.820 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:04:13.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:04:13.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:04:13.827 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:04:13.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:04:13.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:04:13.830 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:04:13.862 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:49:77:ac:ec:9c:af:68:af:4f:13:11:d5:10:58:4f:33:02:b5:0a] modulus: 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 public exponent: 10001 ] 2022-07-08 15:06:02.980 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:06:02.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:06:02.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-08 15:06:02.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:06:02.988 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-08 15:06:02.989 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:06:02.989 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:06:02.991 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:06:02.992 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:06:02.993 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:06:03.008 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:06:03.009 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:06:03.010 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:06:03.010 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:06:03.159 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:06:03.160 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:06:03.160 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:06:03.161 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:06:03.164 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:06:03.165 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:06:03.165 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:06:03.166 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:06:03.166 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:06:03.168 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:06:03.168 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:06:03.169 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:06:03.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:06:03.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:06:03.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:06:03.172 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:06:03.177 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: ab99caeef1c68fe5a24b940213518aec548a0cc5221663d2c592640e2d15f3bd36608f1ce6b7d251d39ae92d6c488321e1d9709bf07c79e6b83cdfdf0c3ee30b606a941c381d70f0012885995cf31af0b997445bdbdd4cc62a084a2a62f050eef504710f72cda3337722ee740ed5d61055d58887079b98151ee9498c94336c928a7781bc710d1c42c6977c179b8f7314dcc56bdd1fabf96e08ab7897f6c7d2384751fffc0df144565167e08124f8223f6d9e71e97083ad45cd486ac1edcc2189b3b4855c1f2db7bdf7dfb79888b9077c19e6862e2df79a784856f1486d100c421b418bcd687ca490b7192ba92f6469d06d2b0c7c5cc72bf6e280eea33cf93202b53200c42fdc3f6166b1604998e53b1c1cbe0dbe3cafe8492c93645f1a6d53b4523725cfa9ee9eea53062b0d10481629f3d1f87956fb977049db0544631be45b5f3c69dbd64cd9207409fe9a8fa4fc44133f824b68963930c5cdca1f62c9494e5984f036c0d9517b5e21241a2178ba9283bc882c30bcf53b442a7ec98458d71d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:fb:32:3c:3e:94:da:29:da:70:c3:0e:84:37:78:ad:63:fd:3f:fb] modulus: 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 public exponent: 10001 ] 2022-07-08 15:07:09.383 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:07:09.385 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:07:09.387 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-08 15:07:09.388 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:07:09.389 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-08 15:07:09.390 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:07:09.391 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:07:09.391 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:07:09.392 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:07:09.393 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:07:09.408 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:07:09.409 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:07:09.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:07:09.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:07:09.626 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:07:09.626 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:07:09.627 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:07:09.627 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:07:09.630 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:07:09.630 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:07:09.631 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:07:09.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:07:09.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:07:09.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:07:09.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:07:09.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:07:09.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:07:09.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:07:09.636 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:07:09.637 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:07:09.643 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:52:61:40:b5:12:31:c1:cc:99:d8:0f:81:62:09:20:3f:3e:34:c6] modulus: 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 public exponent: 10001 ] 2022-07-08 15:09:46.051 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:09:46.055 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:09:46.058 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-08 15:09:46.059 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:09:46.060 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-08 15:09:46.070 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:09:46.071 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:09:46.071 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:09:46.072 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:09:46.073 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:09:46.080 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:09:46.082 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:09:46.082 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:09:46.082 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:09:46.264 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:09:46.264 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:09:46.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:09:46.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:09:46.267 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:09:46.267 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:09:46.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:09:46.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:09:46.269 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:09:46.270 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:09:46.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:09:46.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:09:46.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:09:46.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:09:46.273 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:09:46.274 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:09:46.280 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:ec:22:dd:90:14:2b:6e:f5:c0:83:43:b9:2c:f9:b1:cc:80:b5:95] modulus: 9bc0d19ed2eb5b105e59ea33c3a7efdd790523f3e4b1602bd8247e9873ca05f2fe6fb9208e89e08c84ff6a3c72fc1766a9085d2ca59c481b24a499d02434898e5e84c6f8dfe31e8b99191c3324eb3825678aa434b3bd8834c275f03043539ce0498ba189e10ef9b1933fe6cc2b7b6ab623b417f566359de16182a6bbacdc8eff1e4ab374fe2656738da78fa43ed8d86c453cce2627e8d173e9d307fa43582be011ebc0a2654663cd0d0d7968b0a9efb4f746d7d7cb47ff97b441f7e409ce9c19e3ee468b323303f74994b144255f136b6ef1906182c02a908fed9f3b9aa2b1f48b6430ad30a52fbdd41d7bf1f9e308105ddb6b865182f8bf9b32bda80cb184ef public exponent: 10001 ] 2022-07-08 15:20:11.544 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:20:11.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:20:11.560 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-08 15:20:11.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:20:11.563 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-08 15:20:11.565 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:20:11.566 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:20:11.567 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:20:11.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:20:11.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:20:11.577 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:20:11.578 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:20:11.578 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:20:11.579 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:20:11.796 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:20:11.797 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:20:11.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:20:11.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:20:11.801 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:20:11.802 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:20:11.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:20:11.803 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:20:11.804 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:20:11.805 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:20:11.806 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:20:11.806 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:20:11.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:20:11.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:20:11.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:20:11.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:20:11.813 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: ab99caeef1c68fe5a24b940213518aec548a0cc5221663d2c592640e2d15f3bd36608f1ce6b7d251d39ae92d6c488321e1d9709bf07c79e6b83cdfdf0c3ee30b606a941c381d70f0012885995cf31af0b997445bdbdd4cc62a084a2a62f050eef504710f72cda3337722ee740ed5d61055d58887079b98151ee9498c94336c928a7781bc710d1c42c6977c179b8f7314dcc56bdd1fabf96e08ab7897f6c7d2384751fffc0df144565167e08124f8223f6d9e71e97083ad45cd486ac1edcc2189b3b4855c1f2db7bdf7dfb79888b9077c19e6862e2df79a784856f1486d100c421b418bcd687ca490b7192ba92f6469d06d2b0c7c5cc72bf6e280eea33cf93202b53200c42fdc3f6166b1604998e53b1c1cbe0dbe3cafe8492c93645f1a6d53b4523725cfa9ee9eea53062b0d10481629f3d1f87956fb977049db0544631be45b5f3c69dbd64cd9207409fe9a8fa4fc44133f824b68963930c5cdca1f62c9494e5984f036c0d9517b5e21241a2178ba9283bc882c30bcf53b442a7ec98458d71d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:d8:4c:19:56:f0:04:cb:7c:e1:e3:6d:cb:62:a4:89:27:93:04:33] modulus: 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 public exponent: 10001 ] 2022-07-08 15:27:16.863 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:27:16.869 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:27:16.872 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-08 15:27:16.873 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:27:16.874 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-08 15:27:16.875 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:27:16.875 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:27:16.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:27:16.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:27:16.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:27:16.886 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:27:16.887 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:27:16.887 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:27:16.887 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:27:17.069 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:27:17.070 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:27:17.070 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:27:17.071 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:27:17.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:27:17.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:27:17.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:27:17.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:27:17.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:27:17.075 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:27:17.075 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:27:17.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:27:17.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:27:17.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:27:17.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:27:17.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:27:17.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:65:1c:c9:56:1f:c5:fa:b2:d9:8a:48:c0:c4:e2:4d:c9:29:13:46] modulus: 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 public exponent: 10001 ] 2022-07-08 15:27:34.964 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-08 15:27:34.966 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-08 15:27:34.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-08 15:27:34.969 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-08 15:27:34.970 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-08 15:27:34.971 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-08 15:27:34.971 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-08 15:27:34.972 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-08 15:27:34.972 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-08 15:27:34.973 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-08 15:27:34.981 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-08 15:27:34.982 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:27:34.982 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-08 15:27:34.983 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:27:35.155 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-08 15:27:35.155 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-08 15:27:35.156 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-08 15:27:35.156 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-08 15:27:35.158 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-08 15:27:35.158 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-08 15:27:35.159 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:27:35.159 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:27:35.160 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:27:35.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:27:35.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:27:35.162 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:27:35.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-08 15:27:35.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-08 15:27:35.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-08 15:27:35.165 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-08 15:27:35.169 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 628037756600740552036266635692649894515793544784 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jul 08 13:37:13 UTC 2022 Final Date: Wed Jul 07 13:37:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 27835692214f168471b9a265913b16d894e2631b ba162795fe1908a0fe38b5d2d546ef3e75c05312 31d3ba5f798ad5e9772b47094480101adc256232 63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9 e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511 f9a5b68aeb5788f2bf61bce0b55d010db176d938 fd196e512f698cac9f859f07e183250999641ba5 8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068 01a741a7e47f94426a1f166e2089873a4f23e364 8f2c9aed9574464e2481bd294980c6cd4305e5e4 35e527886583d2c22a643bb5ecf5868c0cf24437 7b4e5da46532218c58b087cf0c40397353853609 ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897 b9c8afe49b12bb124d6dcf542f69a292b76963db 7298e243e3766a2ab2fa4634ac59ca46f6440356 ae1159b63972a301e6c09fc25c08e71365c00463 b5a32f9af0e458db4fdb48f9e53829a569879ad2 01af4364a4984e2e50258e7fb56bdcd06cd9a593 53641cab23b7aca58bfe672ae95271935546800b 838c6fe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:e4:cf:6c:bf:dd:a7:b1:2f:1a:d2:8c:63:b7:0c:dc:b7:00:12:3d] modulus: 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 public exponent: 10001 ]