By type
2022-11-15 03:02:12,652 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-15 03:02:13,527 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-15 03:02:14.174 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 15, 2022 3:02:15 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 15, 2022 3:02:15 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 15, 2022 3:02:15 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 15, 2022 3:02:15 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-15 03:02:16.624 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-15 03:02:16.876 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-15 03:02:17.039 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-15 03:02:17.677 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-15 03:02:17.680 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-15 03:02:17.681 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-15 03:02:17.684 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-15 03:02:17.720 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-15 03:02:17.723 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-15 03:02:17.806 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-15 03:02:18.303 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 15, 2022 3:02:19 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-15 03:02:19.234 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.262 seconds (JVM running for 8.591) Nov 15, 2022 3:02:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-15 03:03:09.708 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 03:03:09.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 03:03:09.747 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-15 03:03:09.751 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 03:03:09.763 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-15 03:03:09.765 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 03:03:09.766 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 03:03:09.768 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 03:03:09.768 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 03:03:09.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 03:03:09.778 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 03:03:09.781 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 03:03:09.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 03:03:09.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 03:03:09.820 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 03:03:09.824 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 03:03:10.371 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 03:03:10.374 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 03:03:10.374 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 03:03:10.375 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 03:03:10.382 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 03:03:10.383 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 03:03:10.384 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 03:03:10.384 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 03:03:10.384 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 03:03:10.393 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 03:03:10.394 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 03:03:10.394 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 03:03:10.399 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 03:03:10.400 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 03:03:10.400 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 03:03:10.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 03:03:10.426 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:8e:2b:88:f1:0f:d5:7c:22:30:35:a4:db:8a:3c:6f:79:b2:7c:d6] modulus: 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 public exponent: 10001 ] 2022-11-15 04:13:24.124 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:13:24.126 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:13:24.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:13:24.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:13:24.130 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:13:24.131 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:13:24.131 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:13:24.131 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:13:24.132 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:13:24.132 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:13:24.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:13:24.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:13:24.141 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:13:24.141 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:13:24.399 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:13:24.400 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:13:24.400 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:13:24.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:13:24.403 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:13:24.403 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:13:24.403 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:13:24.404 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:13:24.404 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:13:24.405 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:13:24.405 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:13:24.405 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:13:24.406 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:13:24.406 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:13:24.407 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:13:24.408 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:13:24.412 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:e6:97:70:41:30:b8:b8:a0:e3:d5:1e:15:6e:55:29:97:30:65:89] modulus: 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 public exponent: 10001 ] 2022-11-15 04:15:05.639 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:15:05.640 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:15:05.643 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-15 04:15:05.645 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:15:05.646 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-15 04:15:05.646 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:15:05.647 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:15:05.647 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:15:05.648 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:15:05.649 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:15:05.654 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:15:05.655 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:15:05.656 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:15:05.656 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:15:05.839 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:15:05.840 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:15:05.841 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:15:05.841 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:15:05.843 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:15:05.844 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:15:05.844 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:15:05.844 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:15:05.845 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:15:05.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:15:05.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:15:05.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:15:05.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:15:05.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:15:05.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:15:05.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:15:05.851 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:67:fa:b5:23:83:a8:e1:80:25:d1:0f:49:46:61:38:6b:24:4f:80] modulus: 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 public exponent: 10001 ] 2022-11-15 04:16:21.648 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:16:21.650 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:16:21.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-15 04:16:21.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:16:21.653 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-15 04:16:21.654 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:16:21.654 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:16:21.654 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:16:21.655 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:16:21.655 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:16:21.660 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:16:21.661 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:16:21.662 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:16:21.662 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:16:21.914 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:16:21.916 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:16:21.917 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:16:21.917 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:16:21.920 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:16:21.920 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:16:21.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:16:21.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:16:21.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:16:21.922 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:16:21.922 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:16:21.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:16:21.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:16:21.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:16:21.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:16:21.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:16:21.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:83:9f:7e:ec:2e:b0:4e:22:2f:8a:84:49:e3:38:68:cc:b7:5b:83] modulus: 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 public exponent: 10001 ] 2022-11-15 04:18:20.609 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:18:20.613 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:18:20.615 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:18:20.616 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:18:20.617 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:18:20.619 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:18:20.619 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:18:20.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:18:20.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:18:20.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:18:20.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:18:20.625 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:18:20.625 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:18:20.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:18:20.828 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:18:20.829 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:18:20.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:18:20.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:18:20.832 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:18:20.832 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:18:20.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:18:20.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:18:20.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:18:20.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:18:20.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:18:20.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:18:20.835 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:18:20.835 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:18:20.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:18:20.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:18:20.840 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:f1:79:a2:98:55:f4:7d:5f:58:fd:26:16:52:58:62:d8:ba:6c:f7] modulus: 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 public exponent: 10001 ] 2022-11-15 04:24:43.265 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:24:43.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:24:43.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:24:43.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:24:43.271 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:24:43.271 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:24:43.272 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:24:43.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:24:43.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:24:43.273 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:24:43.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:24:43.281 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:24:43.281 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:24:43.281 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:24:43.481 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:24:43.482 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:24:43.482 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:24:43.482 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:24:43.484 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:24:43.485 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:24:43.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:24:43.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:24:43.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:24:43.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:24:43.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:24:43.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:24:43.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:24:43.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:24:43.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:24:43.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:24:43.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:a9:db:22:c8:9c:ff:65:62:05:db:05:11:80:28:df:e7:84:93:25] modulus: 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 public exponent: 10001 ] 2022-11-15 04:28:39.300 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:28:39.302 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:28:39.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:28:39.304 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:28:39.304 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-15 04:28:39.305 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:28:39.305 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:28:39.305 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:28:39.305 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:28:39.306 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:28:39.309 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:28:39.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:28:39.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:28:39.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:28:39.489 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:28:39.490 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:28:39.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:28:39.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:28:39.491 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:28:39.491 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:28:39.491 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:28:39.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:28:39.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:28:39.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:28:39.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:28:39.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:28:39.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:28:39.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:28:39.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:28:39.494 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:28:39.497 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:10:61:53:26:38:16:dc:9d:b5:5a:6f:56:6d:d2:b8:1e:83:b3:af] modulus: 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 public exponent: 10001 ] 2022-11-15 04:35:12.642 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:35:12.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:35:12.646 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-15 04:35:12.646 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:35:12.647 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-15 04:35:12.647 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:35:12.647 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:35:12.647 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:35:12.648 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:35:12.648 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:35:12.651 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:35:12.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:35:12.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:35:12.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:35:12.879 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:35:12.880 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:35:12.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:35:12.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:35:12.882 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:35:12.883 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:35:12.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:35:12.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:35:12.884 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:35:12.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:35:12.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:35:12.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:35:12.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:35:12.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:35:12.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:35:12.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:35:12.894 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:57:b5:17:de:cf:90:e2:9c:b1:52:80:eb:2b:7b:8b:09:6d:b7:f3] modulus: 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 public exponent: 10001 ] 2022-11-15 04:39:57.317 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:39:57.318 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:39:57.322 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-15 04:39:57.323 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:39:57.324 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-15 04:39:57.325 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:39:57.325 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:39:57.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:39:57.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:39:57.326 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:39:57.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:39:57.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:39:57.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:39:57.331 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:39:57.504 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:39:57.505 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:39:57.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:39:57.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:39:57.508 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:39:57.508 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:39:57.508 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:39:57.509 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:39:57.509 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:39:57.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:39:57.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:39:57.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:39:57.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:39:57.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:39:57.514 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:39:57.515 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:39:57.519 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:47:4a:77:5d:49:b9:9f:3c:32:f4:19:e6:ec:3c:d4:63:d5:d5:3b] modulus: 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 public exponent: 10001 ] 2022-11-15 04:40:14.850 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-15 04:40:14.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-15 04:40:14.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-15 04:40:14.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-15 04:40:14.852 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-15 04:40:14.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-15 04:40:14.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-15 04:40:14.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-15 04:40:14.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-15 04:40:14.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-15 04:40:14.857 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-15 04:40:14.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:40:14.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-15 04:40:14.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:40:15.046 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-15 04:40:15.046 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-15 04:40:15.047 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-15 04:40:15.047 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-15 04:40:15.048 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-15 04:40:15.049 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-15 04:40:15.049 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:40:15.049 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:40:15.049 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:40:15.049 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:40:15.050 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:40:15.050 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:40:15.051 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-15 04:40:15.051 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-15 04:40:15.052 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-15 04:40:15.052 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-15 04:40:15.054 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 561824809579493790279822863592937895766905438676 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 15 02:58:56 UTC 2022 Final Date: Sun Nov 14 02:58:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33b1a783642e6a906311b32598da708818b809c9 04a38c2a43ade183c02fb11f6c85a9bf6ac81238 1f21f9ea7932500f010e96f03df85dd1012e6d62 d5b8a8017d4c3ad377d8b58b7d3dba82429081a9 0b7eb5490a4e17978333bdca1eaae5337bf51cf2 7f4f110943950351cfc3808ddb702e4a193efabd 7f650c457b3bb157758bb5e34141153430eae297 8261ac59deaa8d3100f8e102a012de6081214167 20f91226b1e4169d4bb5d38778e81151dddef479 5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4 4d762cc7a50543ebba248c930113d40643536273 d407ed4e05521bbcd30c9782d60847afb410b409 6de6d53516eca2cfa7d037f26109a3bbbeecec29 99b64f14b855704e67793094bdbd485811249f19 4b54d213c1110238ce3a7161d6039dab7ac97afd 9ed8b7b405a889666b68393a6d3fce835ac69766 1632d577e244ca12fac9afcb73dceca212975124 6da5e183f7a0b938185516919a12236b9dce8b35 1edba072f237f60ff4857a44a57f48e99d473d87 a3742532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:8e:e3:8e:1e:ed:36:3f:22:2b:b1:53:d7:36:54:81:59:a4:ed:9a] modulus: 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 public exponent: 10001 ]