By type
2022-12-26 03:31:00,128 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-26 03:31:01,206 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-26 03:31:01.905 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 26, 2022 3:31:03 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 26, 2022 3:31:03 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 26, 2022 3:31:03 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 26, 2022 3:31:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-26 03:31:04.577 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-26 03:31:04.867 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-26 03:31:05.039 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-26 03:31:05.936 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-26 03:31:05.939 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-26 03:31:05.940 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-26 03:31:05.944 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-26 03:31:05.984 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-26 03:31:05.987 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-26 03:31:06.110 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-26 03:31:06.799 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 26, 2022 3:31:07 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-26 03:31:07.691 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.514 seconds (JVM running for 16.297) Dec 26, 2022 3:31:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-26 04:53:32.310 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 04:53:32.324 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 04:53:32.392 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 04:53:32.397 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 04:53:32.418 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 04:53:32.421 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 04:53:32.423 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 04:53:32.424 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 04:53:32.425 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 04:53:32.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 04:53:32.447 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 04:53:32.452 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 04:53:32.765 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 04:53:32.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 04:53:32.777 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 04:53:32.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 04:53:33.357 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 04:53:33.360 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 04:53:33.360 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 04:53:33.362 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 04:53:33.372 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 04:53:33.373 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 04:53:33.374 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 04:53:33.374 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 04:53:33.375 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 04:53:33.401 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 04:53:33.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 04:53:33.403 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 04:53:33.419 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 04:53:33.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 04:53:33.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 04:53:33.424 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 04:53:33.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:55:9f:b5:fa:c9:c2:ff:ce:88:c0:70:b7:08:ac:ef:96:0a:9d:e0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:00:13.201 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:00:13.205 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:00:13.208 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:00:13.209 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:00:13.210 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:00:13.211 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:00:13.211 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:00:13.212 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:00:13.213 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:00:13.213 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:00:13.219 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:00:13.220 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:00:13.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:00:13.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:00:14.141 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:00:14.142 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:00:14.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:00:14.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:00:14.148 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:00:14.149 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:00:14.149 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:00:14.150 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:00:14.150 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:00:14.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:00:14.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:00:14.153 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:00:14.154 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:00:14.154 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:00:14.155 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:00:14.156 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:00:14.161 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:85:33:14:bb:df:47:a4:fa:5c:f8:33:b6:c3:0a:53:68:62:ab:12],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:02:02.602 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:02:02.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:02:02.611 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-26 05:02:02.612 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:02:02.613 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-26 05:02:02.614 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:02:02.615 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:02:02.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:02:02.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:02:02.617 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:02:02.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:02:02.622 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:02:02.623 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:02:02.623 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:02:03.109 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:02:03.115 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:02:03.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:02:03.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:02:03.118 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:02:03.123 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:02:03.124 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:02:03.124 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:02:03.125 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:02:03.128 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:02:03.128 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:02:03.128 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:02:03.129 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:02:03.131 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:02:03.131 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:02:03.133 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:02:03.141 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:70:cd:24:f9:cc:6c:01:19:dc:9f:c9:94:73:50:0b:76:13:e8:bd],[56:66:d1:a4] modulus: baa36e29b48ad876e4fcd8108e748d6fd026c96c446c6a35b9d3935f3fd33058928ae0c776a2792f2713d2dfd49837c0e6e03006cdf95444ed401e6a052ee5a71f13a2840abbf812a1784bd8cf0d0bf612f7d45c036f414e69875c88c432735181768e4ecbcf6e1d94ed118361058cd37cf19ad70527f73e5295f8accac38bd12eebeeb18deb501cee363948b7ef4cb626aa1509627aa29fdf105f3de8b49663e9f8f333c9eb410f56728d00fe1c857858a890c7a8f07abaf8b6238b16ad86eb769d22718040e54b9894408cab12389e74a3ce720a34eccf4cd3c1a7c3932ac853f2e668e23878938aa408e8f922410cf543d180f33c8426d475a7b67f0a946b public exponent: 10001 ] 2022-12-26 05:04:21.509 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:04:21.510 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:04:21.512 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-26 05:04:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:04:21.519 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-26 05:04:21.524 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:04:21.524 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:04:21.525 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:04:21.531 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:04:21.532 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:04:21.537 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:04:21.537 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:04:21.537 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:04:21.551 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:04:21.959 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:04:21.962 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:04:21.962 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:04:21.963 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:04:21.967 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:04:21.967 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:04:21.978 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:04:21.981 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:04:21.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:04:21.983 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:04:21.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:04:21.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:04:21.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:04:21.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:04:21.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:04:21.988 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:04:21.995 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: b44876ba1ab372a0cb7827d3254487cfabffea6a66d66a5702bee19f4c4dd86da3b56959e1523cc507d5930bc5ad612d12c5f58760e16ff45b0bf8c185d4f18ab15ce2aedba8805e644de56bea5aac62b2222e2378929a1cd9e52fd01aee3990947e567c21ca7c75126cc96c69ee965c0a91931babb4904e0a5e2ae98ccead13af9c29d7d42c2ddc07835f1e102e94c7a07232c9dd39584833b364127cc3b36daacdbfe96d7913c096b38451bb9dd2c5032590a51963d31f1bf700e7954c94754b1e7fc2b3bc0fc775607276a0773257f96fa076f5e0402ee33559768fa6720b98345893f3df95903ed96c8889e4a15ee869ee9b96ec44cd6d0087cce4c7edde261e7f34dd5f8620b97d9504366d2288150f125f058ccf5ab06936b5dc98566c4c178e4c59557aa1f27aaeb524aa27aafe96d02558e7a49204c2d55c627054d66423724f18230cc17c09476514bf0446a977a51bb698e26736903aecedff0c032ac14082a2dcbad1120d3911d906c98903979585b389c1bb90f29d1971ed7ceb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:ef:d0:64:b4:d6:06:3c:c5:e2:07:db:cf:19:68:3d:6a:34:35:1e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:07:09.990 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:07:09.994 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:07:09.997 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:07:09.998 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:07:09.999 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:07:10.000 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:07:10.000 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:07:10.001 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:07:10.002 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:07:10.002 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:07:10.008 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:07:10.009 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:07:10.009 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:07:10.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:07:10.304 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:07:10.305 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:07:10.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:07:10.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:07:10.308 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:07:10.308 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:07:10.309 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:07:10.309 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:07:10.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:07:10.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:07:10.311 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:07:10.312 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:07:10.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:07:10.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:07:10.314 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:07:10.315 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:07:10.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:e5:10:dd:91:1a:59:76:0f:2e:e3:50:64:1c:9f:fc:04:d5:66:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:14:25.087 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:14:25.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:14:25.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:14:25.097 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:14:25.098 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:14:25.100 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:14:25.100 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:14:25.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:14:25.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:14:25.103 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:14:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:14:25.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:14:25.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:14:25.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:14:25.327 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:14:25.327 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:14:25.328 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:14:25.328 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:14:25.329 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:14:25.330 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:14:25.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:14:25.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:14:25.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:14:25.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:14:25.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:14:25.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:14:25.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:14:25.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:14:25.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:14:25.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:14:25.339 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:1c:0a:4c:83:cf:14:18:2a:a7:6e:fe:9e:26:f9:88:16:68:a0:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:20:13.460 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:20:13.467 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:20:13.470 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:20:13.472 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:20:13.473 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-26 05:20:13.474 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:20:13.475 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:20:13.475 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:20:13.475 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:20:13.476 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:20:13.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:20:13.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:20:13.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:20:13.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:20:13.768 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:20:13.769 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:20:13.769 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:20:13.769 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:20:13.771 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:20:13.772 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:20:13.773 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:20:13.773 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:20:13.773 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:20:13.774 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:20:13.775 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:20:13.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:20:13.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:20:13.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:20:13.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:20:13.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:20:13.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:6a:91:e9:d1:61:c6:b4:58:72:c5:3d:35:5a:6b:a6:03:c5:c1:d7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:27:14.633 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:27:14.636 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:27:14.638 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-26 05:27:14.639 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:27:14.639 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-26 05:27:14.640 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:27:14.640 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:27:14.641 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:27:14.641 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:27:14.642 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:27:14.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:27:14.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:27:14.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:27:14.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:27:14.871 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:27:14.871 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:27:14.872 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:27:14.872 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:27:14.873 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:27:14.874 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:27:14.875 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:27:14.875 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:27:14.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:27:14.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:27:14.877 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:27:14.877 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:27:14.878 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:27:14.878 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:27:14.878 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:27:14.879 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:27:14.883 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:06:df:7c:62:c8:48:2d:89:38:ea:01:69:cc:dd:61:aa:0e:88:b7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:34:37.837 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:34:37.841 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:34:37.844 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-26 05:34:37.845 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:34:37.845 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-26 05:34:37.846 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:34:37.847 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:34:37.847 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:34:37.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:34:37.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:34:37.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:34:37.854 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:34:37.854 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:34:37.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:34:38.126 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:34:38.127 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:34:38.127 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:34:38.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:34:38.129 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:34:38.129 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:34:38.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:34:38.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:34:38.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:34:38.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:34:38.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:34:38.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:34:38.133 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:34:38.133 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:34:38.133 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:34:38.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:34:38.138 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:fb:ea:03:ea:f9:25:d0:87:c9:df:f8:cf:14:c8:df:a5:7e:a7:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 05:35:18.970 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 05:35:18.971 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 05:35:18.974 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-26 05:35:18.974 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 05:35:18.975 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-26 05:35:18.976 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 05:35:18.977 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 05:35:18.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 05:35:18.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 05:35:18.978 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 05:35:18.983 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 05:35:18.984 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:35:18.985 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 05:35:18.985 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:35:19.166 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 05:35:19.166 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 05:35:19.166 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 05:35:19.167 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 05:35:19.168 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 05:35:19.168 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 05:35:19.169 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:35:19.169 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:35:19.169 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:35:19.170 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:35:19.170 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:35:19.170 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:35:19.171 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 05:35:19.171 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 05:35:19.171 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 05:35:19.172 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 05:35:19.181 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:7e:32:7b:b6:dc:b6:65:80:b9:49:dd:9b:c9:7b:4d:70:4f:ea:cb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 06:00:41.840 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 06:00:41.844 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 06:00:41.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-26 06:00:41.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 06:00:41.848 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-26 06:00:41.849 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 06:00:41.849 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 06:00:41.850 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 06:00:41.851 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 06:00:41.851 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 06:00:41.857 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 06:00:41.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 06:00:41.859 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 06:00:41.867 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 06:00:42.259 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 06:00:42.260 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 06:00:42.260 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 06:00:42.261 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 06:00:42.263 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 06:00:42.263 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 06:00:42.264 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 06:00:42.264 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 06:00:42.265 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 06:00:42.266 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 06:00:42.266 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 06:00:42.267 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 06:00:42.267 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 06:00:42.268 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 06:00:42.268 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 06:00:42.269 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 06:00:42.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:0c:2e:01:0f:7f:64:8b:57:24:c2:32:e1:23:03:0c:05:ed:49:31],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-26 06:00:49.173 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-26 06:00:49.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-26 06:00:49.176 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-26 06:00:49.176 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-26 06:00:49.177 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-26 06:00:49.178 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-26 06:00:49.178 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-26 06:00:49.179 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-26 06:00:49.179 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-26 06:00:49.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-26 06:00:49.184 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-26 06:00:49.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 06:00:49.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-26 06:00:49.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 06:00:49.402 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-26 06:00:49.402 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-26 06:00:49.403 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-26 06:00:49.403 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-26 06:00:49.404 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-26 06:00:49.405 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-26 06:00:49.406 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 06:00:49.407 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 06:00:49.407 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 06:00:49.408 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 06:00:49.408 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 06:00:49.409 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 06:00:49.409 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-26 06:00:49.410 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-26 06:00:49.410 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-26 06:00:49.411 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-26 06:00:49.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 202397466490031016822071139762837780342389933632 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Dec 26 03:08:21 UTC 2022 Final Date: Sat Dec 25 03:08:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:54:f8:24:c6:bc:b9:23:8d:fc:3f:86:92:b9:e4:93:54:ce:40:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 28ae3fa5b6cdbb4db75e550edfa370876c20bbe8 ded2032a9e52424ae9d5647b94ff6c30c7f565e8 8745bd8f8a1caecc0e0ab3c7d57c4053e8933ec1 a5de5b07ae809b5ac9f18897adc717a755d9d127 fe1d9c7436a4ce9c757d12bf63bd788f198c26fc ef40e8b569db17094713abc4dcc0a4145a035e5e dc06c81059d5ec6fe00640f2b5c736577ed52fcb b8ba191390bb0e0af5fc8c869aa08f18e23ffc85 5b21e7ed6985583ea674f96c0669d2258cf083ba ff2ee95c28eecb6da2b1e574474d9be83b6ad19b eb8b6bcb6661e3cd2ccb9dd38ed273ec826eb859 1453fcfefc902b0366a33a9524500a5a05f9a2e6 3341fb92b417ff5c7d073ff19867463634f6374d bd9810c0d18bdcc6aff4f1b635ad25978fba7486 e973f6781a093bae2b63c11f328722aa56e4f8d8 47e646ad38bee0b4305489acf2b43452581f9693 ed639bfdf8d6b5a2d114048d0b24376509bd4ac2 06e68392a6e2e293cc6a428828fc0b4abb29e760 692559abb9c332d906335c8a37683faa1797320d 77a5cc82 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:3f:20:08:79:04:4a:cc:28:f8:3b:1b:dd:0d:0b:99:25:47:17:73],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]