By type
2022-11-18 03:20:18,485 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-18 03:20:20,127 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-18 03:20:20.975 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 18, 2022 3:20:23 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 18, 2022 3:20:23 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 18, 2022 3:20:23 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 18, 2022 3:20:23 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-18 03:20:23.770 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-18 03:20:24.101 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-18 03:20:24.318 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-18 03:20:25.307 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-18 03:20:25.310 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-18 03:20:25.311 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-18 03:20:25.315 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-18 03:20:25.366 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-18 03:20:25.371 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-18 03:20:25.517 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-18 03:20:26.248 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 18, 2022 3:20:27 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-18 03:20:27.264 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.774 seconds (JVM running for 11.555) Nov 18, 2022 3:20:52 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-18 04:24:50.710 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:24:50.722 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:24:50.772 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:24:50.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:24:50.801 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:24:50.804 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:24:50.805 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:24:50.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:24:50.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:24:50.812 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:24:50.822 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:24:50.826 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:24:50.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:24:50.889 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:24:50.891 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:24:50.895 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:24:51.545 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:24:51.548 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:24:51.549 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:24:51.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:24:51.560 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:24:51.561 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:24:51.562 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:24:51.562 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:24:51.563 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:24:51.582 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:24:51.583 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:24:51.583 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:24:51.590 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:24:51.590 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:24:51.590 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:24:51.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:24:51.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:c0:54:bf:86:4c:c9:d2:0d:84:86:49:4e:a1:93:b4:04:ce:6c:1b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:26:37.883 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:26:37.885 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:26:37.887 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-18 04:26:37.888 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:26:37.889 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-18 04:26:37.890 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:26:37.890 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:26:37.891 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:26:37.891 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:26:37.892 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:26:37.899 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:26:37.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:26:37.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:26:37.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:26:38.021 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:26:38.023 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:26:38.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:26:38.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:26:38.027 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:26:38.027 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:26:38.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:26:38.029 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:26:38.029 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:26:38.030 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:26:38.031 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:26:38.031 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:26:38.032 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:26:38.033 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:26:38.033 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:26:38.034 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:26:38.038 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a8:42:31:81:d4:9e:d4:d3:b1:3c:91:3c:03:07:7f:1c:5a:ac:1d:4f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:28:09.910 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:28:09.911 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:28:09.913 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-18 04:28:09.913 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:28:09.914 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-18 04:28:09.915 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:28:09.915 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:28:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:28:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:28:09.917 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:28:09.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:28:09.922 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:28:09.923 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:28:09.923 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:28:10.054 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:28:10.055 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:28:10.056 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:28:10.056 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:28:10.058 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:28:10.058 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:28:10.058 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:28:10.059 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:28:10.059 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:28:10.060 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:28:10.060 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:28:10.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:28:10.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:28:10.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:28:10.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:28:10.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:28:10.066 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:5c:ac:2c:7a:4a:49:83:21:a4:51:47:a5:ee:17:0d:c6:d2:82:37],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:30:43.403 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:30:43.405 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:30:43.406 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:30:43.407 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:30:43.408 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:30:43.409 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:30:43.409 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:30:43.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:30:43.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:30:43.411 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:30:43.415 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:30:43.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:30:43.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:30:43.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:30:43.611 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:30:43.612 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:30:43.612 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:30:43.613 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:30:43.614 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:30:43.614 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:30:43.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:30:43.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:30:43.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:30:43.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:30:43.617 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:30:43.617 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:30:43.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:30:43.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:30:43.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:30:43.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:30:43.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:3f:9b:6c:9e:4c:d4:13:84:96:e1:bb:82:46:45:a5:6b:d2:38:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:37:08.008 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:37:08.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:37:08.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:37:08.015 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:37:08.016 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:37:08.017 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:37:08.017 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:37:08.018 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:37:08.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:37:08.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:37:08.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:37:08.026 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:37:08.026 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:37:08.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:37:08.166 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:37:08.167 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:37:08.167 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:37:08.167 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:37:08.169 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:37:08.169 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:37:08.170 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:37:08.170 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:37:08.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:37:08.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:37:08.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:37:08.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:37:08.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:37:08.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:37:08.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:37:08.174 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:37:08.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:dd:18:f1:84:a1:4e:e7:b3:3b:8a:68:44:4e:c4:46:81:a6:d8:1d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:41:57.272 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:41:57.274 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:41:57.276 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:41:57.277 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:41:57.278 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 04:41:57.279 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:41:57.279 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:41:57.280 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:41:57.280 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:41:57.281 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:41:57.286 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:41:57.287 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:41:57.287 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:41:57.288 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:41:57.403 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:41:57.404 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:41:57.404 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:41:57.405 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:41:57.406 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:41:57.406 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:41:57.407 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:41:57.407 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:41:57.407 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:41:57.408 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:41:57.409 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:41:57.409 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:41:57.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:41:57.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:41:57.410 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:41:57.411 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:41:57.414 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:4a:20:7d:a6:2d:86:35:17:59:19:70:67:46:ca:41:29:96:51:e2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:49:05.226 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:49:05.229 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:49:05.232 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-18 04:49:05.233 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:49:05.234 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-18 04:49:05.234 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:49:05.235 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:49:05.235 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:49:05.235 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:49:05.236 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:49:05.240 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:49:05.241 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:49:05.241 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:49:05.242 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:49:05.391 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:49:05.392 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:49:05.392 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:49:05.392 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:49:05.394 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:49:05.394 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:49:05.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:49:05.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:49:05.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:49:05.396 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:49:05.396 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:49:05.397 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:49:05.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:49:05.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:49:05.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:49:05.399 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:49:05.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: ee99cd05dcab0377e2266876a3fb4c10a3d00cc7d06482b9233f7f65248e524787e49b2dddf23fbb3e5a9b3303b8e14540a90e4439765d95200d5375cf12f7bce506232a70f61abd5de92c51b604f71cf9b11e3fc153aeee71408bf7b89bfcc23acbed604a80b4cd4d0d56aaec4bf4096f1c6c2918d180d71d05765c923fed0e1e4a30420b110f73a1db3b8ea66abefe729dd89cc4bd4afc4547908323adfe5185103e80ef1a9ad5cea37063b1e9f5793169942a7a16c9dad44d76ce8a2ee2ea38d615d8bd3a14cc5a2b94c6bad02d86ca9cd89e6e4a5bb14bedc39edcd3ed1bc0722a4710ace971d1b5f436a6342772e10ba3b03c300caa3cfc0af6fb0e4be9ba9bc2d7b9d41ef9cb44664768842e676e183914c0d582993a6f29f9232fc497834d558f36c7ff671a2d4ad504e1bc34e746224323d37497a927e58a096326d92d1d3e26c7c3229f81470c6ed3412b95c8ecf08e5e652d08992f7bd72ff573363277176e6f9cd3f62bcf02d06115267fca03d63b5ae25a34217c8176cba38a63 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:68:02:3c:1f:e3:f9:83:d8:79:60:b9:81:4a:49:7e:0c:d8:55:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:54:33.312 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:54:33.314 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:54:33.316 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 04:54:33.316 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:54:33.317 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 04:54:33.318 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:54:33.318 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:54:33.318 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:54:33.319 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:54:33.319 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:54:33.323 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:54:33.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:54:33.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:54:33.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:54:33.446 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:54:33.446 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:54:33.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:54:33.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:54:33.448 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:54:33.449 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:54:33.449 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:33.449 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:33.450 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:33.450 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:33.451 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:33.451 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:33.452 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:33.452 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:33.452 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:33.453 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:54:33.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:37:8a:b0:a4:e1:19:0c:33:b9:bf:05:8c:22:17:db:b2:bd:18:9d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:54:33.756 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:54:33.757 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:54:33.758 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 04:54:33.759 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:54:33.759 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 04:54:33.760 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:54:33.760 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:54:33.760 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:54:33.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:54:33.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:54:33.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:54:33.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:54:33.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:54:33.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:54:33.854 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:54:33.855 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:54:33.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:54:33.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:54:33.857 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:54:33.857 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:54:33.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:33.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:33.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:33.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:33.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:33.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:33.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:33.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:33.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:33.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:54:33.866 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:37:8a:b0:a4:e1:19:0c:33:b9:bf:05:8c:22:17:db:b2:bd:18:9d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 04:54:52.153 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 04:54:52.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 04:54:52.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 04:54:52.157 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 04:54:52.157 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 04:54:52.157 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 04:54:52.158 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 04:54:52.158 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 04:54:52.159 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 04:54:52.159 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 04:54:52.163 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 04:54:52.163 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:54:52.164 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 04:54:52.164 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:54:52.311 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 04:54:52.311 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 04:54:52.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 04:54:52.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 04:54:52.313 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 04:54:52.313 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 04:54:52.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:52.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:52.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:52.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:52.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:52.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:52.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 04:54:52.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 04:54:52.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 04:54:52.317 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 04:54:52.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:44:d9:75:7d:78:b5:c4:c0:69:33:d0:20:50:28:bb:64:cd:ec:4d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 05:18:03.177 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 05:18:03.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 05:18:03.183 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 05:18:03.184 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 05:18:03.184 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 05:18:03.185 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 05:18:03.185 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 05:18:03.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 05:18:03.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 05:18:03.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 05:18:03.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 05:18:03.191 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 05:18:03.191 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 05:18:03.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 05:18:03.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 05:18:03.325 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 05:18:03.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 05:18:03.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 05:18:03.328 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 05:18:03.328 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 05:18:03.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 05:18:03.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 05:18:03.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 05:18:03.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 05:18:03.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 05:18:03.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 05:18:03.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 05:18:03.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 05:18:03.336 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 05:18:03.338 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 05:18:03.345 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:9d:c1:b0:a0:d0:d3:46:c1:d6:85:25:41:40:0d:5d:dd:91:d7:d6],[56:66:d1:a4] modulus: a5963a3e6e3c9e8dd0f43ba0f02ee439c8fa5e93537f47b2b3288a806c7e9ee9e8fbacc5a61a09502777bc2b22379d40e46696c0d4aa257ef3e0808fef46e6d354f00898106d89a326a5aca6f5b64835c067be0ff603fc48cb783930a4cca8d6236318be8c2100ab5cbb9920c5398a835f733dc03c766a5de2cec139f3b263f71697b888be02e0d9221f117f2ad169f399c0399388200056603e275e61cd4fa14893f09a0e87f0a5b08d81b8b726f1536405c7c47a2e0698c430fa4814191208b27ebd46a6572e3df764648ea861af2561babb0a4ecdb8085d17dc5a2687c444ddbba3103cd1af2a7344cabea372d7c4382f4ac359a266f4008c1c494dff9b73 public exponent: 10001 ] 2022-11-18 05:18:08.120 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-18 05:18:08.121 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-18 05:18:08.122 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 05:18:08.122 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 05:18:08.123 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 05:18:08.123 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-18 05:18:08.124 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-18 05:18:08.124 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-18 05:18:08.125 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-18 05:18:08.125 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-18 05:18:08.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-18 05:18:08.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 05:18:08.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-18 05:18:08.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 05:18:08.222 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-18 05:18:08.223 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-18 05:18:08.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-18 05:18:08.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 05:18:08.225 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-18 05:18:08.226 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-18 05:18:08.226 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 05:18:08.226 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 05:18:08.227 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 05:18:08.227 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 05:18:08.228 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 05:18:08.228 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 05:18:08.228 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 05:18:08.229 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-18 05:18:08.229 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-18 05:18:08.230 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 05:18:08.233 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 253284495461147904723615709209011468537304410665 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 02:59:58 UTC 2022 Final Date: Wed Nov 17 02:59:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:86:71:a2:7f:47:49:56:c5:82:08:c3:b1:de:e6:0c:7c:cb:c0:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c66a667a536c3961a32f86468f4e13546e875ba4 5ec7500e72a4ea8dc5c3939a2c842d2bf6e1b3a0 2d4bc6f8c272e6fd1ef80cc79822b794e47f6f28 dde82bb02ccaecbd7944c4dbcb55199029055336 474ef209c29eb9c3cadabb097b0ec9a5863c19c4 12872d297221f1bc4a53f7610217aaa6d0b924db 437add074bf2313878e67c05122b275438a55578 70fdafd7310bdb1b6043c89d17f295d7828fc6be bf55916c756ddfa7ec4a0e96e29adcae98108989 8abc9782a429e4029fc68a2294f195df0133e135 486cb7403c19c831e7ab0702d4dec8bde424aa0c 6f4bc01c69cd0d88eb588ba0e9336fa6a6103fdf 0a919365379618840a140c54e8b0edcebc670de0 2273abb12ab9d2b3d604a05a3d35f3b8066e5e43 01f55c0680ed0d4c741160cc2a6a755b6139c625 b7a6dfadece5c5ef66b5fbedc0a5b8d7f4a4cc43 4212748f9abbd0c8de44b8d2350b2f201ab4a487 5c1e4c0c860938169ec137ab5b864107312c3863 d9d2115ee5bb45e7143652749ac2c9b9a1a83b32 e11dfd6a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:1e:71:52:a3:6a:fd:34:62:82:c3:06:b1:87:68:74:af:d1:ab:0f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]