By type
2022-12-01 18:33:19,784 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-01 18:33:21,207 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-01 18:33:22.195 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 01, 2022 6:33:24 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 01, 2022 6:33:24 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 01, 2022 6:33:24 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 01, 2022 6:33:24 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-01 18:33:24.894 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-01 18:33:25.165 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-01 18:33:25.318 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-01 18:33:25.971 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-01 18:33:25.976 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-12-01 18:33:25.978 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-01 18:33:25.983 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-01 18:33:26.034 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-01 18:33:26.038 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-12-01 18:33:26.175 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-01 18:33:26.780 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 01, 2022 6:33:27 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-01 18:33:27.698 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.95 seconds (JVM running for 11.453) Dec 01, 2022 6:33:53 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-01 18:35:29.665 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 18:35:29.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 18:35:29.711 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-01 18:35:29.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 18:35:29.745 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-01 18:35:29.747 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 18:35:29.749 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 18:35:29.750 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 18:35:29.750 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 18:35:29.754 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 18:35:29.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 18:35:29.763 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 18:35:29.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 18:35:29.800 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 18:35:29.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 18:35:29.805 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 18:35:30.766 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 18:35:30.769 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 18:35:30.769 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 18:35:30.770 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 18:35:30.780 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 18:35:30.781 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 18:35:30.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 18:35:30.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 18:35:30.783 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 18:35:30.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 18:35:30.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 18:35:30.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 18:35:30.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 18:35:30.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 18:35:30.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 18:35:30.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 18:35:30.831 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:0f:d8:fc:fc:50:91:98:02:a2:50:2d:b9:5b:d0:e5:ec:47:b2:3b] modulus: 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 public exponent: 10001 ] 2022-12-01 20:16:46.791 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:16:46.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:16:46.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:16:46.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:16:46.800 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:16:46.801 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:16:46.802 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:16:46.802 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:16:46.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:16:46.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:16:46.814 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:16:46.815 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:16:46.816 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:16:46.816 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:16:47.075 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:16:47.076 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:16:47.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:16:47.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:16:47.082 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:16:47.082 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:16:47.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:16:47.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:16:47.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:16:47.086 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:16:47.087 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:16:47.087 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:16:47.089 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:16:47.090 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:16:47.090 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:16:47.092 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:16:47.098 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: c5a50ebe5045364dd675b2feb0c32c6561105ed918db37a46fe0d875c6845e316658f5cfa95fab3b8b79387dd062b09e5633b1dd1b9467ba6e316c7a8daf681d19bdb6fc2641d188689c90896092f2799831a68cafdc4c8a0f64f45473df47af952012957fe4cd513e992bb4b8211342fc21b19ca48ac4ba80e51a2ed04787c71875f1792b208743c8a91abf5c7d909002b00f3f2f6599f53d895d70a5475be0502abe0d5b61a7e273052c07581572ec986c62b6e095bbb45eccf49c98e4a2d478a2d79f233fe64eab8291ca8f7d5b41925b61cb5c20a334991e99e96ec24c60b4344cfe0a9bb5d3342645624bbd621b4e016ace0ff4fdcfed659968e7fd9fbab7fad3d110aec8d5a9cd9ea1012f2ed8d49cafe943a994dcb55cfd28dd2cb9d2b9f338566c4934b68a517df7440876cc3ab05c8397af668e299d022158b728c0a020be64a0937cfe9d129ceec5e143cdb16d60fc272791ef34913a707144f64735ab4750243b7a3d4aca51ef4576397cc41f22708a9e525186ec70c0c37cf4eb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:57:6d:49:e9:2e:a5:64:44:48:3c:27:ab:46:a6:7f:75:2c:3d:86] modulus: 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 public exponent: 10001 ] 2022-12-01 20:18:48.743 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:18:48.745 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:18:48.746 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-01 20:18:48.748 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:18:48.749 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-01 20:18:48.750 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:18:48.750 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:18:48.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:18:48.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:18:48.752 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:18:48.776 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:18:48.777 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:18:48.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:18:48.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:18:48.930 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:18:48.931 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:18:48.932 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:18:48.932 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:18:48.934 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:18:48.935 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:18:48.935 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:18:48.936 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:18:48.936 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:18:48.938 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:18:48.938 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:18:48.938 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:18:48.939 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:18:48.939 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:18:48.940 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:18:48.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:18:48.945 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:13:50:04:13:86:e1:c3:2e:dc:3d:12:c5:e0:60:73:aa:2b:5e:0b] modulus: c81711e7c8f46c81124d905b7b884111e4fcfb5dd51aa3616e20e566f30cc5a370eb059df59804ab365d4a216f48196bd41bbd828b1fa93dd9947d1fb2a45bca673fcab6c070866bc5d0ddcd5508a9276f5c63d82c74bc29b44bc77f9654b0ea0546fe119b46a4195ed4fa19f8e94fea2f7b8d45c0ac7e61589873d7d7b13b566ca5b3527e2708c05dd31ebcfcc7af946ebfcfa16dbe8c471e40c207965c8e808be2c65337f86e4986676aeba6c41126ac3769a2fee3272788f3d3bcffb802122cbd2d2f974e0a7207a55f73b0cb9d528ad8d03d45b9008dca6757130619a460a6eb7b66521ba4cea0cce9aa30470581d7baee2430c6bcb3051b881d32d672d9 public exponent: 10001 ] 2022-12-01 20:20:51.419 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:20:51.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:20:51.423 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-01 20:20:51.423 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:20:51.424 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-01 20:20:51.425 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:20:51.425 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:20:51.425 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:20:51.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:20:51.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:20:51.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:20:51.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:20:51.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:20:51.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:20:51.625 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:20:51.626 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:20:51.627 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:20:51.627 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:20:51.631 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:20:51.632 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:20:51.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:20:51.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:20:51.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:20:51.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:20:51.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:20:51.635 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:20:51.636 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:20:51.636 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:20:51.636 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:20:51.637 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:20:51.642 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:5e:d9:b5:c9:52:9d:b4:ee:75:fa:a5:ed:ad:08:5a:cf:ac:b0:be] modulus: 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 public exponent: 10001 ] 2022-12-01 20:24:00.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:24:00.648 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:24:00.650 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:24:00.651 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:24:00.652 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:24:00.654 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:24:00.655 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:24:00.655 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:24:00.656 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:24:00.657 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:24:00.662 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:24:00.663 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:24:00.663 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:24:00.663 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:24:00.852 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:24:00.853 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:24:00.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:24:00.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:24:00.855 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:24:00.856 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:24:00.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:24:00.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:24:00.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:24:00.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:24:00.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:24:00.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:24:00.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:24:00.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:24:00.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:24:00.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:24:00.865 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:ce:4b:fb:59:f5:ec:3b:c3:f0:3e:6b:43:0d:00:b7:df:77:fc:01] modulus: 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 public exponent: 10001 ] 2022-12-01 20:30:38.117 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:30:38.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:30:38.132 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:30:38.133 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:30:38.133 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:30:38.138 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:30:38.138 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:30:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:30:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:30:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:30:38.148 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:30:38.149 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:30:38.150 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:30:38.150 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:30:38.327 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:30:38.328 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:30:38.329 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:30:38.329 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:30:38.331 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:30:38.331 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:30:38.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:30:38.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:30:38.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:30:38.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:30:38.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:30:38.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:30:38.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:30:38.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:30:38.337 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:30:38.337 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:30:38.341 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:80:03:61:c1:78:1d:2c:53:39:9e:86:6b:7d:3e:41:62:70:5f:43] modulus: d45cda81dc58c2cfbab58c7e2faed6828dff0841f95913eaeee817f268ba55cf189976231191653875393ebba1cca3532b67568f157bf703e62db667010a33fdedc549315931309cdefedb34440e1ad9e8352cab956e05cac002ced0941640507f5c02c0b2c499e5996bcccb950920b5c998a7c0f77bf74940634a923733356902382032e784043dbd6b2f3e6e630c2ba5f957f99051976276de87ead1dc47d2e9dd2759ded649e1d4a416e9ffb629b8902c19a7b25de67a7283d0c15330200313eb6e710867fdf2e028c7d679b8794ade7893975fb9931244d32f12b08ce627e93c40332389ff52411dc94b8194086232b908f00bfbe7f8f10c21a9107d32fd public exponent: 10001 ] 2022-12-01 20:34:31.621 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:34:31.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:34:31.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:34:31.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:34:31.632 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:34:31.632 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:34:31.633 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:34:31.633 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:34:31.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:34:31.634 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:34:31.640 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:34:31.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:34:31.642 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:34:31.642 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:34:31.827 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:34:31.828 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:34:31.828 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:34:31.829 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:34:31.830 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:34:31.831 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:34:31.832 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:34:31.833 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:34:31.833 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:34:31.834 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:34:31.835 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:34:31.835 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:34:31.837 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:34:31.838 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:34:31.838 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:34:31.839 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:34:31.843 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: c5a50ebe5045364dd675b2feb0c32c6561105ed918db37a46fe0d875c6845e316658f5cfa95fab3b8b79387dd062b09e5633b1dd1b9467ba6e316c7a8daf681d19bdb6fc2641d188689c90896092f2799831a68cafdc4c8a0f64f45473df47af952012957fe4cd513e992bb4b8211342fc21b19ca48ac4ba80e51a2ed04787c71875f1792b208743c8a91abf5c7d909002b00f3f2f6599f53d895d70a5475be0502abe0d5b61a7e273052c07581572ec986c62b6e095bbb45eccf49c98e4a2d478a2d79f233fe64eab8291ca8f7d5b41925b61cb5c20a334991e99e96ec24c60b4344cfe0a9bb5d3342645624bbd621b4e016ace0ff4fdcfed659968e7fd9fbab7fad3d110aec8d5a9cd9ea1012f2ed8d49cafe943a994dcb55cfd28dd2cb9d2b9f338566c4934b68a517df7440876cc3ab05c8397af668e299d022158b728c0a020be64a0937cfe9d129ceec5e143cdb16d60fc272791ef34913a707144f64735ab4750243b7a3d4aca51ef4576397cc41f22708a9e525186ec70c0c37cf4eb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:f3:38:bf:2f:e8:f3:8d:c8:56:09:5c:bb:79:5f:f2:ec:d6:cf:e1] modulus: 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 public exponent: 10001 ] 2022-12-01 20:41:06.309 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:41:06.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:41:06.313 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:41:06.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:41:06.314 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:41:06.315 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:41:06.315 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:41:06.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:41:06.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:41:06.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:41:06.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:41:06.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:41:06.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:41:06.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:41:06.467 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:41:06.467 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:41:06.468 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:41:06.468 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:41:06.469 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:41:06.470 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:41:06.470 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:41:06.470 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:41:06.470 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:41:06.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:41:06.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:41:06.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:41:06.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:41:06.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:41:06.473 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:41:06.473 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:41:06.477 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:82:95:ef:e8:62:df:84:73:e3:0b:c8:64:64:fb:e0:5b:fa:41:ec] modulus: de2c3d38394ffd4f6621b97e7b897300c43ea493ecf3c59069eae08da416efc7b786321b45131fa476baa0ef0e04a4d241bf0bc06777a1676cee8fd6b469aba8cddea37bb5cb620223051269991f7272f56ed5a48e880c5afd9629052aee8fd620ef968bb7c2b71b6b484f9a54abceea535ad1b437ef7f659ee8f6eec50048a7bca9d1ab9d7963cdf9aae7c3aa9d2156e2f415f0552212ca998dbad9f3534461648c18f1c1dc817d0ea4bb57d8a2b4e5be2a53707a41b97bcaf1ebfc6f6dd7ff680265bee334eb809d55b91857307540285372f0797a566a36d023025187d3c73cf62866dfae8ad56dcee7e26cff865cb30fe1ffcfdf112336834f89b2446faf public exponent: 10001 ] 2022-12-01 20:44:56.638 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:44:56.642 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:44:56.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:44:56.647 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:44:56.647 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 20:44:56.648 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:44:56.649 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:44:56.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:44:56.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:44:56.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:44:56.657 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:44:56.658 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:44:56.658 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:44:56.658 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:44:56.811 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:44:56.812 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:44:56.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:44:56.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:44:56.815 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:44:56.816 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:44:56.817 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:44:56.817 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:44:56.818 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:44:56.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:44:56.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:44:56.820 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:44:56.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:44:56.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:44:56.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:44:56.822 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:44:56.827 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:00:16:e1:ce:75:91:f8:16:c0:23:74:6f:9c:f7:e2:47:05:e4:92] modulus: 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 public exponent: 10001 ] 2022-12-01 20:56:40.108 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 20:56:40.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 20:56:40.115 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-01 20:56:40.116 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 20:56:40.117 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-01 20:56:40.118 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 20:56:40.118 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 20:56:40.118 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 20:56:40.119 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 20:56:40.119 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 20:56:40.125 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 20:56:40.127 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:56:40.127 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 20:56:40.127 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:56:40.301 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 20:56:40.302 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 20:56:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 20:56:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 20:56:40.305 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 20:56:40.305 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 20:56:40.306 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:56:40.306 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:56:40.307 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:56:40.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:56:40.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:56:40.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:56:40.309 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 20:56:40.310 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 20:56:40.310 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 20:56:40.311 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 20:56:40.315 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:98:ba:84:4b:75:cb:2c:91:6c:5c:94:28:2a:6f:be:3d:f4:65:03] modulus: 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 public exponent: 10001 ] 2022-12-01 21:03:55.147 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 21:03:55.151 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 21:03:55.154 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 21:03:55.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 21:03:55.156 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 21:03:55.156 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 21:03:55.157 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 21:03:55.157 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 21:03:55.157 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 21:03:55.158 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 21:03:55.164 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 21:03:55.165 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 21:03:55.166 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 21:03:55.166 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 21:03:55.445 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 21:03:55.446 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 21:03:55.447 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 21:03:55.448 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 21:03:55.450 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 21:03:55.450 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 21:03:55.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 21:03:55.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 21:03:55.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 21:03:55.452 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 21:03:55.453 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 21:03:55.453 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 21:03:55.454 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 21:03:55.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 21:03:55.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 21:03:55.456 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 21:03:55.461 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:f3:c1:14:d9:d4:09:21:9b:8a:52:cf:ec:f8:f8:08:59:ec:b0:6a] modulus: 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 public exponent: 10001 ] 2022-12-01 21:04:26.266 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 21:04:26.268 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 21:04:26.269 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 21:04:26.270 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 21:04:26.271 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 21:04:26.271 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 21:04:26.272 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 21:04:26.272 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 21:04:26.273 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 21:04:26.273 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 21:04:26.278 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 21:04:26.279 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 21:04:26.279 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 21:04:26.280 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 21:04:26.474 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 21:04:26.475 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 21:04:26.476 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 21:04:26.476 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 21:04:26.478 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 21:04:26.478 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 21:04:26.479 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 21:04:26.479 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 21:04:26.480 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 21:04:26.481 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 21:04:26.481 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 21:04:26.482 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 21:04:26.482 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 21:04:26.483 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 21:04:26.483 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 21:04:26.484 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 21:04:26.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 322820689892086672665266192590114361918491969537 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 18:30:37 UTC 2022 Final Date: Tue Nov 30 18:30:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:71:66:9b:b1:cd:12:7e:d6:e3:03:94:ba:30:fa:ea:bd:2e:5b:b5] modulus: c5a50ebe5045364dd675b2feb0c32c6561105ed918db37a46fe0d875c6845e316658f5cfa95fab3b8b79387dd062b09e5633b1dd1b9467ba6e316c7a8daf681d19bdb6fc2641d188689c90896092f2799831a68cafdc4c8a0f64f45473df47af952012957fe4cd513e992bb4b8211342fc21b19ca48ac4ba80e51a2ed04787c71875f1792b208743c8a91abf5c7d909002b00f3f2f6599f53d895d70a5475be0502abe0d5b61a7e273052c07581572ec986c62b6e095bbb45eccf49c98e4a2d478a2d79f233fe64eab8291ca8f7d5b41925b61cb5c20a334991e99e96ec24c60b4344cfe0a9bb5d3342645624bbd621b4e016ace0ff4fdcfed659968e7fd9fbab7fad3d110aec8d5a9cd9ea1012f2ed8d49cafe943a994dcb55cfd28dd2cb9d2b9f338566c4934b68a517df7440876cc3ab05c8397af668e299d022158b728c0a020be64a0937cfe9d129ceec5e143cdb16d60fc272791ef34913a707144f64735ab4750243b7a3d4aca51ef4576397cc41f22708a9e525186ec70c0c37cf4eb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b350b2e0c98171aa12e138d2513794713673204a c5275d8461ad9223343cee59f4de2a046b16172e 084ff01ef5cfa572ac5330e3e196a2f926a321e7 3985cddbeb7291e997e7d66c69556a78ac56105b 9992b64d17ac0ddf38a859bc653d107311a2ea84 002bcbc5508e001aec73c9db200f523e3875f729 c67ae6dda62ca813301cca4aba7155a0ba098ca7 863e6c09246dee9c87db5a6dee0031f820246180 2c42923641c73b6d7dda79c8fd89b5e66d5b2c6f 37778737cde7c305a8e1e50569a6eac3888d35c8 f97626a4a925a56d5a1b73b2648c569d839c6c8a e2efdea8775d4b532ac8827cf6527aac3712d996 ffd0fda165726ef5f4939b08a972c03fe3b5cc83 cf88bd88b9c57407004773412f5d19409979741a b859af10366d39220fb648688095e9956a3b2896 3ec2e8f947ada5347facda0939d5a3ed1a72caa7 2a374c62aa63ab6e32f91b4d9b5aae96e7fbe0b5 bb01c3f2dc27ff84bbeafa31d1a9ab7ad94aec6a f551ba823196667ca2d7d640b51e3d49748b6f40 4681e7c4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:f2:3a:34:71:f2:3e:5a:94:d7:04:39:0a:29:0a:fa:3f:ab:0b:15] modulus: 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 public exponent: 10001 ]